Name "SMASHData::severity" used only once: possible typo at bin/generate-cvrf-cve.pl line 732. Name "CanDBReader::bugzillas" used only once: possible typo at bin/generate-cvrf-cve.pl line 78. Name "CanDBReader::note" used only once: possible typo at bin/generate-cvrf-cve.pl line 65. Name "PInt::cve2images" used only once: possible typo at bin/generate-cvrf-cve.pl line 381. Name "PInt::image2cves" used only once: possible typo at bin/generate-cvrf-cve.pl line 380. cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:* cpe:2.3:a:libexpat_project:libexpat:2:*:*:*:*:*:*:* cpe:2.3:a:libexpat_project:libexpat:2:*:*:*:*:*:*:* Update is not defined in translation list. Use of uninitialized value within %name2product in concatenation (.) or string at /home/securitybot/prod/cve-database/bin/UpdateInfoReader.pm line 1598. SUSE:Channels/SUSE-ALP-Source-Standard_1.0 skipped no pkglist for SUSE Liberty Linux 8, ESEA-2020:0159 no pkglist for SUSE Liberty Linux 8, ESBA-2020:0166 no pkglist for SUSE Liberty Linux 9, RHBA-2024:3832 no pkglist for SUSE Liberty Linux 9, RHSA-2024:3837 no pkglist for SUSE Liberty Linux 8, ESEA-2020:0158 no pkglist for SUSE Liberty Linux 8, ESEA-2021:0189 no pkglist for SUSE Liberty Linux 8, ESEA-2021:0190 no pkglist for SUSE Liberty Linux 8, ESSA-2020:0164 no pkglist for SUSE Liberty Linux 8, RHBA-2022:5328 SUSE:SLE-15:Update:PubClouds:Released SLES15-SAP-Azure-LI-BYOS images x86_64 has empty xml SUSE:SLE-15:Update:PubClouds:Released SLES15-SAP-Azure-VLI-BYOS images x86_64 has empty xml SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-CAP-Deployment-BYOS images x86_64 has empty xml SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-CAP-Deployment-BYOS:Azure images x86_64 has empty xml SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-CHOST-BYOS images x86_64 has empty xml SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-Manager-4-0-Azure-BYOS images x86_64 has empty xml SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-Manager-4-0-EC2-HVM-BYOS images x86_64 has empty xml SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-Manager-4-0-GCE-BYOS images x86_64 has empty xml SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-SAP-Azure-LI-BYOS images x86_64 has empty xml SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-SAP-Azure-VLI-BYOS images x86_64 has empty xml SUSE:SLE-15-SP1:Update:PubClouds:Released SLES15-SP1-SAPCAL images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2 images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-BYOS images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CAP-Deployment-BYOS images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CAP-Deployment-BYOS:EC2-HVM images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CAP-Deployment-BYOS:GCE images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-CHOST-BYOS images x86_64 has empty xml no files in SLES15-SP2-HPC no files in SLES15-SP2-HPC-BYOS SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-HPC:EC2-HVM images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-Manager-4-1-Proxy-BYOS images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-Manager-4-1-Server-BYOS images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP-Azure-LI-BYOS images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP-Azure-VLI-BYOS images x86_64 has empty xml SUSE:SLE-15-SP2:Update:PubClouds:Released SLES15-SP2-SAP-BYOS images x86_64 has empty xml no files in SLES15-SP3 no files in SLES15-SP3-BYOS no files in SLES15-SP3-CHOST-BYOS no files in SLES15-SP3-HPC no files in SLES15-SP3-HPC-BYOS no files in SLES15-SP3-HPC:EC2-HVM no files in SLES15-SP3-Manager-4-2-Proxy-BYOS no files in SLES15-SP3-Manager-4-2-Server-BYOS no files in SLES15-SP3-Micro-5-1-BYOS no files in SLES15-SP3-Micro-5-2-BYOS no files in SLES15-SP3-Micro-BYOS no files in SLES15-SP3-Micro-BYOS:Azure no files in SLES15-SP3-Micro-BYOS:EC2-HVM no files in SLES15-SP3-SAP no files in SLES15-SP3-SAP-Azure-LI-BYOS no files in SLES15-SP3-SAP-Azure-VLI-BYOS no files in SLES15-SP3-SAP-BYOS no files in SLES15-SP3-SAPCAL no files in SLES15-SP5 no files in SLES15-SP5-BYOS no files in SLES15-SP5-CHOST-BYOS no files in SLES15-SP5-HPC no files in SLES15-SP5-HPC-BYOS no files in SLES15-SP5-Hardened-BYOS no files in SLES15-SP5-SAP no files in SLES15-SP5-SAP-BYOS no files in SLES15-SP5-SAP-Hardened no files in SLES15-SP5-SAP-Hardened-BYOS no files in SLES15-SP5-SAPCAL no files in SLES12-SP4-SAP-Azure-LI-BYOS no files in SLES12-SP4-SAP-Azure-VLI-BYOS no files in SLES12-SP5-Azure no files in SLES12-SP5-EC2 no files in SLES12-SP5-GCE SUSE:SLE-12-SP5:Update:PubClouds:Released SLES12-SP5-OCI-BYOS images x86_64 has empty xml SUSE:SLE-12-SP5:Update:PubClouds:Released SLES12-SP5-SAP-Azure-LI-BYOS images x86_64 has empty xml SUSE:SLE-12-SP5:Update:PubClouds:Released SLES12-SP5-SAP-Azure-VLI-BYOS images x86_64 has empty xml ./smash/pintdata/publiccloudimagechangeinfo.suse.com/alibaba/sles-15-sp5-chost-byos-v20230620/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/alibaba/sles-15-sp5-chost-byos-v20230620/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240311-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240311-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240311-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240311-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240612-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240612-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240612-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-5-v20240612-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240613-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240613-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240613-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240613-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240703-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240703-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240808-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240808-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240808-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/openSUSE-Leap-15-6-v20240808-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-proxy-5-0-byos-v20240923-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-proxy-5-0-byos-v20240923-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-proxy-5-0-byos-v20240923-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-proxy-5-0-byos-v20240923-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-4-3-v20231129-hvm-ssd-x86_64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-4-3-v20231129-hvm-ssd-x86_64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-4-3-v20231129-hvm-ssd-x86_64-ltd/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-4-3-v20231129-hvm-ssd-x86_64-ltd/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-5-0-byos-v20240923-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-5-0-byos-v20240923-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-5-0-byos-v20240923-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-manager-server-5-0-byos-v20240923-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-hpc-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-hpc-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-hpc-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-hpc-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-byos-v20240716-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-byos-v20240716-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-arm64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-arm64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-x86_64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-x86_64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-x86_64-ltd/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-3-v20240716-hvm-ssd-x86_64-ltd/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-4-v20240716-hvm-ssd-arm64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-4-v20240716-hvm-ssd-arm64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-4-v20240716-hvm-ssd-x86_64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-4-v20240716-hvm-ssd-x86_64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-byos-v20231012-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-byos-v20231012-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-byos-v20231012-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-byos-v20231012-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-arm64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-arm64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-arm64-ltd/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-arm64-ltd/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-x86_64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-x86_64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-x86_64-ltd/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-5-5-v20231012-hvm-ssd-x86_64-ltd/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-byos-v20240611-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-byos-v20240611-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-byos-v20240612-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-byos-v20240612-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-v20240612-hvm-ssd-arm64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sle-micro-6-0-v20240612-hvm-ssd-arm64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-byos-v20230620-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-byos-v20230620-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-chost-byos-v20230619-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-chost-byos-v20230619-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-chost-byos-v20230619-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-chost-byos-v20230619-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-hardened-byos-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-hardened-byos-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-sapcal-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-sapcal-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-ecs-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-ecs-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp5-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-byos-v20240704-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-byos-v20240704-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-sapcal-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-sapcal-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-ecs-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-ecs-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-hvm-ssd-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-hvm-ssd-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-15-sp6-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-sap-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-sap-15-sp5-byos-v20230620-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-sap-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/amazon/suse-sles-sap-15-sp6-byos-v20240703-hvm-ssd-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240516-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240516-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240516-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240516-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240808-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240808-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240808-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-5-v20240808-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240612-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240612-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240612-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240612-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240703-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240703-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20241004-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20241004-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20241004-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/opensuse-leap-15-6-v20241004-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-hpc-15-sp5-byos-v20230620-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-hpc-15-sp5-byos-v20230620-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-hpc-15-sp6-byos-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-hpc-15-sp6-byos-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-5-5-byos-v20231012-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-5-5-byos-v20231012-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-5-5-byos-v20231012-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-5-5-byos-v20231012-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-6-0-byos-v20240611-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-6-0-byos-v20240611-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-6-0-byos-v20240612-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sle-micro-6-0-byos-v20240612-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-byos-v20230620-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-byos-v20230620-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-byos-v20230620-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-byos-v20230620-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-chost-byos-v20230619-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-chost-byos-v20230619-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-chost-byos-v20230619-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-chost-byos-v20230619-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-hardened-byos-v20230620-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-hardened-byos-v20230620-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sap-byos-v20230620-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sap-byos-v20230620-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sap-v20230620-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sap-v20230620-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sapcal-v20230620-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sapcal-v20230620-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-v20230620-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-v20230620-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-v20230620-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-v20230620-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-byos-v20240703-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-byos-v20240703-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-byos-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-byos-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-hardened-byos-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-hardened-byos-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sap-byos-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sap-byos-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sap-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sap-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sapcal-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-sapcal-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-v20240703-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-v20240703-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-15-sp6-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp5-hardened-byos-v20230620-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp5-hardened-byos-v20230620-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp5-hardened-v20230620-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp5-hardened-v20230620-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp6-hardened-byos-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp6-hardened-byos-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp6-hardened-v20240703-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/sles-sap-15-sp6-hardened-v20240703-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-proxy-5-0-byos-v20240923-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-proxy-5-0-byos-v20240923-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-proxy-5-0-byos-v20240923-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-proxy-5-0-byos-v20240923-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-server-5-0-byos-v20240923-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-server-5-0-byos-v20240923-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-server-5-0-byos-v20240923-x86-64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/google/suse-manager-server-5-0-byos-v20240923-x86-64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-proxy-5-0-byos-v20240923-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-proxy-5-0-byos-v20240923-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-server-4-3-byos-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-server-4-3-byos-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-server-5-0-byos-v20240923-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-manager-server-5-0-byos-v20240923-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240301-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240301-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240301-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240301-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240708-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240708-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240708-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240708-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240808-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240808-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240808-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-5-v20240808-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240702-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240702-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240702-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240702-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240808-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20240808-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20241003-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-opensuse-leap-15-6-v20241003-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp2-byos-v20240207-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp2-byos-v20240207-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp4-byos-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp4-byos-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp4-byos-v20240206-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp4-byos-v20240206-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-byos-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-byos-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-hpc-15-sp5-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-3-byos-v20240716-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-3-byos-v20240716-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-byos-v20231012-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-byos-v20231012-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-byos-v20231018-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-byos-v20231018-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-v20231012-arm64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-v20231012-arm64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-v20231012-x86_64-llc/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sle-micro-5-5-v20231012-x86_64-llc/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp2-byos-v20240207-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp2-byos-v20240207-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp3-byos-v20240207-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp3-byos-v20240207-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20240207-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20240207-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20240207-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-byos-v20240207-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-hardened-byos-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-hardened-byos-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-sapcal-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp4-sapcal-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-basic-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-basic-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20230620-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20230620-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20231214-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20231214-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-byos-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-chost-byos-v20230619-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-chost-byos-v20230619-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-chost-byos-v20230619-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-chost-byos-v20230619-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-hardened-byos-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-hardened-byos-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-sapcal-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-sapcal-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20230620-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20230620-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20240207-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp5-v20240207-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp6-hardened-byos-v20240808-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp6-hardened-byos-v20240808-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp6-v20240808-arm64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-15-sp6-v20240808-arm64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp2-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp2-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp3-byos-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp3-byos-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp4-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp4-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-byos-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-byos-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-byos-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-byos-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-byos-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-byos-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-byos-v20231214-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-byos-v20231214-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-v20240207-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-hardened-v20240207-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-v20230620-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp5-v20230620-x86_64/package_version_changes.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp6-hardened-v20240808-x86_64/package_changelogs.html:No such file or directory ./smash/pintdata/publiccloudimagechangeinfo.suse.com/microsoft/suse-sles-sap-15-sp6-hardened-v20240808-x86_64/package_version_changes.html:No such file or directory Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. generating CVRF / CVE pages at Tue Oct 29 01:10:15 2024 Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. notsure where SUSE Linux Enterprise Module for Package Hub 15 SP6 is contained? notsure where SUSE Linux Enterprise Module for Package Hub 15 SP5 is contained? Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50382.xml 2024-10-28 01:10:12.591797000 +0100 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50382.xml.new 2024-10-29 01:10:24.640070000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-28T00:10:12Z + 3 + 2024-10-29T00:10:24Z current 2024-10-24T23:10:36Z - 2024-10-28T00:10:12Z + 2024-10-29T00:10:24Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -33,6 +33,10 @@ + https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UY4RL4FBV22PQSJS56OEWPJTGWTDJO2U/ + E-Mail link for openSUSE-SU-2024:14429-1 + + https://www.suse.com/support/security/rating/ SUSE Security Ratings Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50063.xml 2024-10-26 01:10:14.400256000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50063.xml.new 2024-10-29 01:10:28.845804000 +0100 @@ -14,13 +14,13 @@ 1 - 3 - 2024-10-25T23:10:14Z + 4 + 2024-10-29T00:10:28Z current 2024-10-21T23:11:06Z - 2024-10-25T23:10:14Z + 2024-10-29T00:10:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -67,7 +67,1171 @@ SUSE Security Ratings - + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + + + SUSE Linux Enterprise High Availability Extension 12 SP5 + + + + + SUSE Linux Enterprise High Performance Computing 12 SP5 + + + + + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + + + SUSE Linux Enterprise Live Patching 12 SP5 + + + + + SUSE Linux Enterprise Live Patching 15 SP2 + + + + + SUSE Linux Enterprise Live Patching 15 SP3 + + + + + SUSE Linux Enterprise Live Patching 15 SP4 + + + + + SUSE Linux Enterprise Live Patching 15 SP5 + + + + + SUSE Linux Enterprise Live Patching 15 SP6 + + + + + SUSE Linux Enterprise Micro 5.0 + + + + + SUSE Linux Enterprise Micro 5.1 + + + + + SUSE Linux Enterprise Micro 5.2 + + + + + SUSE Linux Enterprise Micro 5.3 + + + + + SUSE Linux Enterprise Micro 5.4 + + + + + SUSE Linux Enterprise Micro 5.5 + + + + + SUSE Linux Enterprise Micro 6.0 + + + + + SUSE Linux Enterprise Real Time 12 SP5 + + + + + SUSE Real Time Module 15 SP5 + + + + + SUSE Linux Enterprise Server 11 SP4 LTSS + + + + + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + + + SUSE Linux Enterprise Server 12 SP2-LTSS + + + + + SUSE Linux Enterprise Server 12 SP4-LTSS + + + + + SUSE Linux Enterprise Server 12 SP5 + + + SUSE Linux Enterprise Software Development Kit 12 SP5 + + + SUSE Linux Enterprise Workstation Extension 12 SP5 + + + + + SUSE Linux Enterprise Server 12 SP5-LTSS + + + + + SUSE Linux Enterprise Server 15 SP1-LTSS + + + + + SUSE Linux Enterprise Server 15 SP2-LTSS + + + + + SUSE Linux Enterprise Server 15 SP3-LTSS + + + + + SUSE Linux Enterprise Server 15 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + + + SUSE Linux Enterprise Server 15-LTSS + + + + + SUSE Linux Enterprise Server Teradata 12 SP3 + + + + + SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + + + SUSE Linux Enterprise Server Teradata 15 SP4 + + + + + SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + SUSE Linux Enterprise Software Development Kit 12 SP5 + + + SUSE Linux Enterprise Workstation Extension 12 SP5 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + + + SUSE Manager Proxy 4.3 + + + + + SUSE Manager Retail Branch Server 4.3 + + + + + SUSE Manager Server 4.3 + + + + + openSUSE Leap 15.5 + + + + + openSUSE Leap 15.6 + + + + cluster-md-kmp-default + + + dlm-kmp-default + + + gfs2-kmp-default + + + kernel-default + + + kernel-default-base + + + kernel-default-devel + + + kernel-default-extra + + + kernel-default-kgraft + + + kernel-default-kgraft-devel + + + kernel-default-livepatch + + + kernel-default-livepatch-devel + + + kernel-default-man + + + kernel-default-optional + + + kernel-default-vdso + + + kernel-devel + + + kernel-devel-azure + + + kernel-devel-rt + + + kernel-macros + + + kernel-rt + + + kernel-source + + + kernel-source-azure + + + kernel-source-rt + + + kernel-source-vanilla + + + kselftests-kmp-default + + + ocfs2-kmp-default + + + reiserfs-kmp-default + + + cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + dlm-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + gfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + ocfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default-kgraft-devel as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-default as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-devel as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-macros as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-source as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-devel-rt as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + kernel-devel-rt as a component of SUSE Linux Enterprise Real Time 12 SP5 + + + kernel-source-rt as a component of SUSE Linux Enterprise Real Time 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default-base as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 15-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 + + + kernel-default-extra as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-default as a component of SUSE Manager Proxy 4.3 + + + kernel-default-devel as a component of SUSE Manager Proxy 4.3 + + + kernel-devel as a component of SUSE Manager Proxy 4.3 + + + kernel-macros as a component of SUSE Manager Proxy 4.3 + + + kernel-source as a component of SUSE Manager Proxy 4.3 + + + kernel-default as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-devel as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-macros as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-source as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-default as a component of SUSE Manager Server 4.3 + + + kernel-default-devel as a component of SUSE Manager Server 4.3 + + + kernel-devel as a component of SUSE Manager Server 4.3 + + + kernel-macros as a component of SUSE Manager Server 4.3 + + + kernel-source as a component of SUSE Manager Server 4.3 + + + kernel-devel-rt as a component of SUSE Real Time Module 15 SP5 + + + kernel-source-rt as a component of SUSE Real Time Module 15 SP5 + + + cluster-md-kmp-default as a component of openSUSE Leap 15.5 + + + dlm-kmp-default as a component of openSUSE Leap 15.5 + + + gfs2-kmp-default as a component of openSUSE Leap 15.5 + + + kernel-default as a component of openSUSE Leap 15.5 + + + kernel-default-devel as a component of openSUSE Leap 15.5 + + + kernel-default-extra as a component of openSUSE Leap 15.5 + + + kernel-default-livepatch as a component of openSUSE Leap 15.5 + + + kernel-default-livepatch-devel as a component of openSUSE Leap 15.5 + + + kernel-default-optional as a component of openSUSE Leap 15.5 + + + kernel-default-vdso as a component of openSUSE Leap 15.5 + + + kselftests-kmp-default as a component of openSUSE Leap 15.5 + + + ocfs2-kmp-default as a component of openSUSE Leap 15.5 + + + reiserfs-kmp-default as a component of openSUSE Leap 15.5 + + + kernel-devel as a component of openSUSE Leap 15.5 + + + kernel-macros as a component of openSUSE Leap 15.5 + + + kernel-source as a component of openSUSE Leap 15.5 + + + kernel-source-vanilla as a component of openSUSE Leap 15.5 + + + cluster-md-kmp-default as a component of openSUSE Leap 15.6 + + + dlm-kmp-default as a component of openSUSE Leap 15.6 + + + gfs2-kmp-default as a component of openSUSE Leap 15.6 + + + kernel-default as a component of openSUSE Leap 15.6 + + + kernel-default-devel as a component of openSUSE Leap 15.6 + + + kernel-default-extra as a component of openSUSE Leap 15.6 + + + kernel-default-livepatch as a component of openSUSE Leap 15.6 + + + kernel-default-livepatch-devel as a component of openSUSE Leap 15.6 + + + kernel-default-optional as a component of openSUSE Leap 15.6 + + + kernel-default-vdso as a component of openSUSE Leap 15.6 + + + kselftests-kmp-default as a component of openSUSE Leap 15.6 + + + ocfs2-kmp-default as a component of openSUSE Leap 15.6 + + + reiserfs-kmp-default as a component of openSUSE Leap 15.6 + + + kernel-devel as a component of openSUSE Leap 15.6 + + + kernel-macros as a component of openSUSE Leap 15.6 + + + kernel-source as a component of openSUSE Leap 15.6 + + + kernel-source-vanilla as a component of openSUSE Leap 15.6 + + In the Linux kernel, the following vulnerability has been resolved: @@ -103,7 +1267,16 @@ This patch adds restriction for tail call to prevent such bypasses. CVE-2024-50063 - + + + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source + SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default + SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source + + moderate skipping CVE-2024-50062 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50060.xml 2024-10-24 01:10:17.400062000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50060.xml.new 2024-10-29 01:10:30.361213000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-23T23:10:17Z + 3 + 2024-10-29T00:10:29Z current 2024-10-21T23:11:07Z - 2024-10-23T23:10:17Z + 2024-10-29T00:10:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -75,5 +75,11 @@ moderate + + + 5.5 + CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H + + skipping CVE-2024-50058 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50057 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50056 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50055.xml 2024-10-26 01:10:18.367061000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50055.xml.new 2024-10-29 01:10:31.672171000 +0100 @@ -14,13 +14,13 @@ 1 - 4 - 2024-10-25T23:10:18Z + 5 + 2024-10-29T00:10:31Z current 2024-10-21T23:11:10Z - 2024-10-25T23:10:18Z + 2024-10-29T00:10:31Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -44,6 +44,14 @@ + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + SUSE Linux Enterprise Module for Basesystem 15 SP6 @@ -52,6 +60,47 @@ SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise High Availability Extension 12 SP5 + + + + + SUSE Linux Enterprise High Performance Computing 12 SP5 + + + + + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + SUSE Linux Enterprise Module for Basesystem 15 SP6 @@ -63,16 +112,148 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + SUSE Linux Enterprise Live Patching 12 SP5 + + + + + SUSE Linux Enterprise Live Patching 15 SP2 + + + + + SUSE Linux Enterprise Live Patching 15 SP3 + + + + + SUSE Linux Enterprise Live Patching 15 SP4 + + + + + SUSE Linux Enterprise Live Patching 15 SP5 + + SUSE Linux Enterprise Live Patching 15 SP6 + + + SUSE Linux Enterprise Micro 5.0 + + + + + SUSE Linux Enterprise Micro 5.1 + + + + + SUSE Linux Enterprise Micro 5.2 + + + + + SUSE Linux Enterprise Micro 5.3 + + + + + SUSE Linux Enterprise Micro 5.4 + + + + + SUSE Linux Enterprise Micro 5.5 + + SUSE Linux Enterprise Micro 6.0 + + + SUSE Linux Enterprise Real Time 12 SP5 + + + + + SUSE Real Time Module 15 SP5 + + + + + SUSE Linux Enterprise Server 11 SP4 LTSS + + + + + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + + + SUSE Linux Enterprise Server 12 SP2-LTSS + + + + + SUSE Linux Enterprise Server 12 SP4-LTSS + + + + + SUSE Linux Enterprise Server 12 SP5 + + + SUSE Linux Enterprise Software Development Kit 12 SP5 + + + SUSE Linux Enterprise Workstation Extension 12 SP5 + + + + + SUSE Linux Enterprise Server 12 SP5-LTSS + + + + + SUSE Linux Enterprise Server 15 SP1-LTSS + + + + + SUSE Linux Enterprise Server 15 SP2-LTSS + + + + + SUSE Linux Enterprise Server 15 SP3-LTSS + + + + + SUSE Linux Enterprise Server 15 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + SUSE Linux Enterprise Module for Basesystem 15 SP6 @@ -84,6 +265,58 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + SUSE Linux Enterprise Server Teradata 12 SP3 + + + + + SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + + + SUSE Linux Enterprise Server Teradata 15 SP4 + + + + + SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + SUSE Linux Enterprise Software Development Kit 12 SP5 + + + SUSE Linux Enterprise Workstation Extension 12 SP5 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + SUSE Linux Enterprise Module for Basesystem 15 SP6 @@ -95,18 +328,73 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + SUSE Manager Proxy 4.3 + + + + + SUSE Manager Retail Branch Server 4.3 + + + + + SUSE Manager Server 4.3 + + + + + openSUSE Leap 15.5 + + + + + openSUSE Leap 15.6 + + + + cluster-md-kmp-default + + + dlm-kmp-default + + + gfs2-kmp-default + kernel-default + + kernel-default-base + kernel-default-devel + + kernel-default-extra + + + kernel-default-kgraft + + + kernel-default-kgraft-devel + kernel-default-livepatch kernel-default-livepatch-devel + + kernel-default-man + + + kernel-default-optional + + + kernel-default-vdso + kernel-devel @@ -119,6 +407,9 @@ kernel-macros + + kernel-rt + kernel-source @@ -128,6 +419,174 @@ kernel-source-rt + + kernel-source-vanilla + + + kselftests-kmp-default + + + ocfs2-kmp-default + + + reiserfs-kmp-default + + + cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + dlm-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + gfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + ocfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default-kgraft-devel as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6 @@ -140,6 +599,66 @@ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.5 + kernel-default as a component of SUSE Linux Enterprise Micro 6.0 @@ -158,6 +677,21 @@ kernel-source-rt as a component of SUSE Linux Enterprise Micro 6.0 + + kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 @@ -173,18 +707,477 @@ kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 + kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6 kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + kernel-devel-rt as a component of SUSE Linux Enterprise Real Time 12 SP5 + + + kernel-source-rt as a component of SUSE Linux Enterprise Real Time 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default-base as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 + + + kernel-default-extra as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-default as a component of SUSE Manager Proxy 4.3 + + + kernel-default-devel as a component of SUSE Manager Proxy 4.3 + + + kernel-devel as a component of SUSE Manager Proxy 4.3 + + + kernel-macros as a component of SUSE Manager Proxy 4.3 + + + kernel-source as a component of SUSE Manager Proxy 4.3 + + + kernel-default as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-devel as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-macros as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-source as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-default as a component of SUSE Manager Server 4.3 + + + kernel-default-devel as a component of SUSE Manager Server 4.3 + + + kernel-devel as a component of SUSE Manager Server 4.3 + + + kernel-macros as a component of SUSE Manager Server 4.3 + + + kernel-source as a component of SUSE Manager Server 4.3 + + + kernel-devel-rt as a component of SUSE Real Time Module 15 SP5 + + + kernel-source-rt as a component of SUSE Real Time Module 15 SP5 + + + cluster-md-kmp-default as a component of openSUSE Leap 15.5 + + + dlm-kmp-default as a component of openSUSE Leap 15.5 + + + gfs2-kmp-default as a component of openSUSE Leap 15.5 + + + kernel-default as a component of openSUSE Leap 15.5 + + + kernel-default-devel as a component of openSUSE Leap 15.5 + + + kernel-default-extra as a component of openSUSE Leap 15.5 + + + kernel-default-livepatch as a component of openSUSE Leap 15.5 + + + kernel-default-livepatch-devel as a component of openSUSE Leap 15.5 + + + kernel-default-optional as a component of openSUSE Leap 15.5 + + + kernel-default-vdso as a component of openSUSE Leap 15.5 + + + kselftests-kmp-default as a component of openSUSE Leap 15.5 + + + ocfs2-kmp-default as a component of openSUSE Leap 15.5 + + + reiserfs-kmp-default as a component of openSUSE Leap 15.5 + + + kernel-devel as a component of openSUSE Leap 15.5 + + + kernel-macros as a component of openSUSE Leap 15.5 + + + kernel-source as a component of openSUSE Leap 15.5 + + + kernel-source-vanilla as a component of openSUSE Leap 15.5 + + + cluster-md-kmp-default as a component of openSUSE Leap 15.6 + + + dlm-kmp-default as a component of openSUSE Leap 15.6 + + + gfs2-kmp-default as a component of openSUSE Leap 15.6 + + + kernel-default as a component of openSUSE Leap 15.6 + + + kernel-default-devel as a component of openSUSE Leap 15.6 + + + kernel-default-extra as a component of openSUSE Leap 15.6 + + + kernel-default-livepatch as a component of openSUSE Leap 15.6 + + + kernel-default-livepatch-devel as a component of openSUSE Leap 15.6 + + + kernel-default-optional as a component of openSUSE Leap 15.6 + + + kernel-default-vdso as a component of openSUSE Leap 15.6 + + + kselftests-kmp-default as a component of openSUSE Leap 15.6 + + + ocfs2-kmp-default as a component of openSUSE Leap 15.6 + + + reiserfs-kmp-default as a component of openSUSE Leap 15.6 + + + kernel-devel as a component of openSUSE Leap 15.6 + + + kernel-macros as a component of openSUSE Leap 15.6 + + + kernel-source as a component of openSUSE Leap 15.6 + + + kernel-source-vanilla as a component of openSUSE Leap 15.6 + skipping CVE-2024-50049 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50048 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50035 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50016.xml 2024-10-24 01:10:23.264393000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50016.xml.new 2024-10-29 01:10:53.718042000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-23T23:10:23Z + 3 + 2024-10-29T00:10:53Z current 2024-10-21T23:11:25Z - 2024-10-23T23:10:23Z + 2024-10-29T00:10:53Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -69,5 +69,11 @@ moderate + + + 5.5 + CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H + + --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50014.xml 2024-10-24 01:10:24.296219000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50014.xml.new 2024-10-29 01:10:55.108911000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-23T23:10:24Z + 3 + 2024-10-29T00:10:54Z current 2024-10-21T23:11:26Z - 2024-10-23T23:10:24Z + 2024-10-29T00:10:54Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -78,7 +78,1230 @@ SUSE Security Ratings - + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + + + SUSE Linux Enterprise High Availability Extension 12 SP5 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise High Performance Computing 12 SP5 + + + + + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + + + SUSE Linux Enterprise Live Patching 12 SP5 + + + + + SUSE Linux Enterprise Live Patching 15 SP2 + + + + + SUSE Linux Enterprise Live Patching 15 SP3 + + + + + SUSE Linux Enterprise Live Patching 15 SP4 + + + + + SUSE Linux Enterprise Live Patching 15 SP5 + + + + + SUSE Linux Enterprise Live Patching 15 SP6 + + + + + SUSE Linux Enterprise Micro 5.0 + + + + + SUSE Linux Enterprise Micro 5.1 + + + + + SUSE Linux Enterprise Micro 5.2 + + + + + SUSE Linux Enterprise Micro 5.3 + + + + + SUSE Linux Enterprise Micro 5.4 + + + + + SUSE Linux Enterprise Micro 5.5 + + + + + SUSE Linux Enterprise Micro 6.0 + + + + + SUSE Linux Enterprise Real Time 12 SP5 + + + + + SUSE Real Time Module 15 SP5 + + + + + SUSE Linux Enterprise Server 11 SP4 LTSS + + + + + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Server 12 SP2-LTSS + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Server 12 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + SUSE Linux Enterprise Server 12 SP5 + + + SUSE Linux Enterprise Software Development Kit 12 SP5 + + + SUSE Linux Enterprise Workstation Extension 12 SP5 + + + + + SUSE Linux Enterprise Server 12 SP5-LTSS + + + + + SUSE Linux Enterprise Server 15 SP1-LTSS + + + + + SUSE Linux Enterprise Server 15 SP2-LTSS + + + + + SUSE Linux Enterprise Server 15 SP3-LTSS + + + + + SUSE Linux Enterprise Server 15 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + + + SUSE Linux Enterprise Server 15-LTSS + + + + + SUSE Linux Enterprise Server Teradata 12 SP3 + + + + + SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + + + SUSE Linux Enterprise Server Teradata 15 SP4 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + SUSE Linux Enterprise Software Development Kit 12 SP5 + + + SUSE Linux Enterprise Workstation Extension 12 SP5 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + + + SUSE Manager Proxy 4.3 + + + + + SUSE Manager Retail Branch Server 4.3 + + + + + SUSE Manager Server 4.3 + + + + + openSUSE Leap 15.5 + + + + + openSUSE Leap 15.6 + + + + cluster-md-kmp-default + + + dlm-kmp-default + + + gfs2-kmp-default + + + kernel-default + + + kernel-default-base + + + kernel-default-devel + + + kernel-default-extra + + + kernel-default-kgraft + + + kernel-default-kgraft-devel + + + kernel-default-livepatch + + + kernel-default-livepatch-devel + + + kernel-default-man + + + kernel-default-optional + + + kernel-default-vdso + + + kernel-devel + + + kernel-devel-azure + + + kernel-devel-rt + + + kernel-macros + + + kernel-rt + + + kernel-source + + + kernel-source-azure + + + kernel-source-rt + + + kernel-source-vanilla + + + kselftests-kmp-default + + + ocfs2-kmp-default + + + reiserfs-kmp-default + + + cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + dlm-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + gfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + ocfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default-kgraft-devel as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-default as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-devel as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-macros as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-source as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-devel-rt as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12 + + + kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + kernel-devel-rt as a component of SUSE Linux Enterprise Real Time 12 SP5 + + + kernel-source-rt as a component of SUSE Linux Enterprise Real Time 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default-base as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 15-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 + + + kernel-default-extra as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-default as a component of SUSE Manager Proxy 4.3 + + + kernel-default-devel as a component of SUSE Manager Proxy 4.3 + + + kernel-devel as a component of SUSE Manager Proxy 4.3 + + + kernel-macros as a component of SUSE Manager Proxy 4.3 + + + kernel-source as a component of SUSE Manager Proxy 4.3 + + + kernel-default as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-devel as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-macros as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-source as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-default as a component of SUSE Manager Server 4.3 + + + kernel-default-devel as a component of SUSE Manager Server 4.3 + + + kernel-devel as a component of SUSE Manager Server 4.3 + + + kernel-macros as a component of SUSE Manager Server 4.3 + + + kernel-source as a component of SUSE Manager Server 4.3 + + + kernel-devel-rt as a component of SUSE Real Time Module 15 SP5 + + + kernel-source-rt as a component of SUSE Real Time Module 15 SP5 + + + cluster-md-kmp-default as a component of openSUSE Leap 15.5 + + + dlm-kmp-default as a component of openSUSE Leap 15.5 + + + gfs2-kmp-default as a component of openSUSE Leap 15.5 + + + kernel-default as a component of openSUSE Leap 15.5 + + + kernel-default-devel as a component of openSUSE Leap 15.5 + + + kernel-default-extra as a component of openSUSE Leap 15.5 + + + kernel-default-livepatch as a component of openSUSE Leap 15.5 + + + kernel-default-livepatch-devel as a component of openSUSE Leap 15.5 + + + kernel-default-optional as a component of openSUSE Leap 15.5 + + + kernel-default-vdso as a component of openSUSE Leap 15.5 + + + kselftests-kmp-default as a component of openSUSE Leap 15.5 + + + ocfs2-kmp-default as a component of openSUSE Leap 15.5 + + + reiserfs-kmp-default as a component of openSUSE Leap 15.5 + + + kernel-devel as a component of openSUSE Leap 15.5 + + + kernel-macros as a component of openSUSE Leap 15.5 + + + kernel-source as a component of openSUSE Leap 15.5 + + + kernel-source-vanilla as a component of openSUSE Leap 15.5 + + + kernel-devel-rt as a component of openSUSE Leap 15.5 + + + kernel-source-rt as a component of openSUSE Leap 15.5 + + + cluster-md-kmp-default as a component of openSUSE Leap 15.6 + + + dlm-kmp-default as a component of openSUSE Leap 15.6 + + + gfs2-kmp-default as a component of openSUSE Leap 15.6 + + + kernel-default as a component of openSUSE Leap 15.6 + + + kernel-default-devel as a component of openSUSE Leap 15.6 + + + kernel-default-extra as a component of openSUSE Leap 15.6 + + + kernel-default-livepatch as a component of openSUSE Leap 15.6 + + + kernel-default-livepatch-devel as a component of openSUSE Leap 15.6 + + + kernel-default-optional as a component of openSUSE Leap 15.6 + + + kernel-default-vdso as a component of openSUSE Leap 15.6 + + + kselftests-kmp-default as a component of openSUSE Leap 15.6 + + + ocfs2-kmp-default as a component of openSUSE Leap 15.6 + + + reiserfs-kmp-default as a component of openSUSE Leap 15.6 + + + kernel-devel as a component of openSUSE Leap 15.6 + + + kernel-macros as a component of openSUSE Leap 15.6 + + + kernel-source as a component of openSUSE Leap 15.6 + + + kernel-source-vanilla as a component of openSUSE Leap 15.6 + + + kernel-devel-rt as a component of openSUSE Leap 15.6 + + + kernel-source-rt as a component of openSUSE Leap 15.6 + + In the Linux kernel, the following vulnerability has been resolved: @@ -125,11 +1348,176 @@ earlier point in __ext4_fill_super() fixes this splat. CVE-2024-50014 - + + + SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default + SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default + SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default + SUSE Linux Enterprise High Availability Extension 12 SP5:kernel-default + SUSE Linux Enterprise High Availability Extension 12 SP5:kernel-source + SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default + SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default + SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source + SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source-azure + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise Live Patching 12 SP5:kernel-default + SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft + SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel + SUSE Linux Enterprise Live Patching 12 SP5:kernel-source + SUSE Linux Enterprise Live Patching 15 SP2:kernel-default + SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch + SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel + SUSE Linux Enterprise Live Patching 15 SP2:kernel-source + SUSE Linux Enterprise Live Patching 15 SP3:kernel-default + SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch + SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel + SUSE Linux Enterprise Live Patching 15 SP3:kernel-source + SUSE Linux Enterprise Micro 5.0:kernel-default + SUSE Linux Enterprise Micro 5.1:kernel-default + SUSE Linux Enterprise Micro 5.1:kernel-rt + SUSE Linux Enterprise Micro 5.1:kernel-source + SUSE Linux Enterprise Micro 5.1:kernel-source-rt + SUSE Linux Enterprise Micro 5.2:kernel-default + SUSE Linux Enterprise Micro 5.2:kernel-rt + SUSE Linux Enterprise Micro 5.2:kernel-source + SUSE Linux Enterprise Micro 5.2:kernel-source-rt + SUSE Linux Enterprise Module for Public Cloud 12:kernel-default + SUSE Linux Enterprise Module for Public Cloud 12:kernel-source + SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt + SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source + SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default + SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source + SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default + SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base + SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man + SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel + SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros + SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source + SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default + SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base + SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man + SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel + SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros + SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source + SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default + SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base + SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man + SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel + SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-azure + SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros + SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source + SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-azure + SUSE Linux Enterprise Server 12 SP5:kernel-default + SUSE Linux Enterprise Server 12 SP5:kernel-default-base + SUSE Linux Enterprise Server 12 SP5:kernel-default-devel + SUSE Linux Enterprise Server 12 SP5:kernel-default-man + SUSE Linux Enterprise Server 12 SP5:kernel-devel + SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure + SUSE Linux Enterprise Server 12 SP5:kernel-macros + SUSE Linux Enterprise Server 12 SP5:kernel-source + SUSE Linux Enterprise Server 12 SP5:kernel-source-azure + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source + SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source + SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source + SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise Server 15-LTSS:kernel-default + SUSE Linux Enterprise Server 15-LTSS:kernel-default-base + SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 15-LTSS:kernel-default-man + SUSE Linux Enterprise Server 15-LTSS:kernel-devel + SUSE Linux Enterprise Server 15-LTSS:kernel-macros + SUSE Linux Enterprise Server 15-LTSS:kernel-source + SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:kernel-default + SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:kernel-source + SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default + SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source + SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default + SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source + SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source + SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source + SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default + SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-default + SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-source + SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default + SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra + SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-source + openSUSE Leap 15.5:kernel-devel-rt + openSUSE Leap 15.5:kernel-source-rt + openSUSE Leap 15.6:cluster-md-kmp-default + openSUSE Leap 15.6:dlm-kmp-default + openSUSE Leap 15.6:gfs2-kmp-default + openSUSE Leap 15.6:kernel-default + openSUSE Leap 15.6:kernel-default-devel + openSUSE Leap 15.6:kernel-default-extra + openSUSE Leap 15.6:kernel-default-livepatch + openSUSE Leap 15.6:kernel-default-livepatch-devel + openSUSE Leap 15.6:kernel-default-optional + openSUSE Leap 15.6:kernel-default-vdso + openSUSE Leap 15.6:kernel-devel + openSUSE Leap 15.6:kernel-devel-rt + openSUSE Leap 15.6:kernel-macros + openSUSE Leap 15.6:kernel-source + openSUSE Leap 15.6:kernel-source-rt + openSUSE Leap 15.6:kernel-source-vanilla + openSUSE Leap 15.6:kselftests-kmp-default + openSUSE Leap 15.6:ocfs2-kmp-default + openSUSE Leap 15.6:reiserfs-kmp-default + + moderate + + + 5.5 + CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H + + skipping CVE-2024-50012 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50011 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50010 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50009 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50008 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50007 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50006.xml 2024-10-24 01:10:28.438127000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-50006.xml.new 2024-10-29 01:10:56.565847000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-23T23:10:28Z + 3 + 2024-10-29T00:10:56Z current 2024-10-21T23:11:29Z - 2024-10-23T23:10:28Z + 2024-10-29T00:10:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -57,7 +57,1230 @@ SUSE Security Ratings - + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + + + SUSE Linux Enterprise High Availability Extension 12 SP5 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise High Performance Computing 12 SP5 + + + + + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + + + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + + + SUSE Linux Enterprise Live Patching 12 SP5 + + + + + SUSE Linux Enterprise Live Patching 15 SP2 + + + + + SUSE Linux Enterprise Live Patching 15 SP3 + + + + + SUSE Linux Enterprise Live Patching 15 SP4 + + + + + SUSE Linux Enterprise Live Patching 15 SP5 + + + + + SUSE Linux Enterprise Live Patching 15 SP6 + + + + + SUSE Linux Enterprise Micro 5.0 + + + + + SUSE Linux Enterprise Micro 5.1 + + + + + SUSE Linux Enterprise Micro 5.2 + + + + + SUSE Linux Enterprise Micro 5.3 + + + + + SUSE Linux Enterprise Micro 5.4 + + + + + SUSE Linux Enterprise Micro 5.5 + + + + + SUSE Linux Enterprise Micro 6.0 + + + + + SUSE Linux Enterprise Real Time 12 SP5 + + + + + SUSE Real Time Module 15 SP5 + + + + + SUSE Linux Enterprise Server 11 SP4 LTSS + + + + + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Server 12 SP2-LTSS + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Server 12 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + SUSE Linux Enterprise Server 12 SP5 + + + SUSE Linux Enterprise Software Development Kit 12 SP5 + + + SUSE Linux Enterprise Workstation Extension 12 SP5 + + + + + SUSE Linux Enterprise Server 12 SP5-LTSS + + + + + SUSE Linux Enterprise Server 15 SP1-LTSS + + + + + SUSE Linux Enterprise Server 15 SP2-LTSS + + + + + SUSE Linux Enterprise Server 15 SP3-LTSS + + + + + SUSE Linux Enterprise Server 15 SP4-LTSS + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + + + SUSE Linux Enterprise Server 15-LTSS + + + + + SUSE Linux Enterprise Server Teradata 12 SP3 + + + + + SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + + + SUSE Linux Enterprise Server Teradata 15 SP4 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + + + SUSE Linux Enterprise Module for Public Cloud 12 + + + SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + SUSE Linux Enterprise Software Development Kit 12 SP5 + + + SUSE Linux Enterprise Workstation Extension 12 SP5 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + + + SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + + + SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + + + SUSE Manager Proxy 4.3 + + + + + SUSE Manager Retail Branch Server 4.3 + + + + + SUSE Manager Server 4.3 + + + + + openSUSE Leap 15.5 + + + + + openSUSE Leap 15.6 + + + + cluster-md-kmp-default + + + dlm-kmp-default + + + gfs2-kmp-default + + + kernel-default + + + kernel-default-base + + + kernel-default-devel + + + kernel-default-extra + + + kernel-default-kgraft + + + kernel-default-kgraft-devel + + + kernel-default-livepatch + + + kernel-default-livepatch-devel + + + kernel-default-man + + + kernel-default-optional + + + kernel-default-vdso + + + kernel-devel + + + kernel-devel-azure + + + kernel-devel-rt + + + kernel-macros + + + kernel-rt + + + kernel-source + + + kernel-source-azure + + + kernel-source-rt + + + kernel-source-vanilla + + + kselftests-kmp-default + + + ocfs2-kmp-default + + + reiserfs-kmp-default + + + cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + dlm-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + gfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + ocfs2-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + + + kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default-kgraft-devel as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-rt as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4 + + + kernel-default as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-source as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.5 + + + kernel-default as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-devel as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-macros as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-source as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-devel-rt as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-source-rt as a component of SUSE Linux Enterprise Micro 6.0 + + + kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-default-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-devel as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-macros as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-source as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12 + + + kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + kernel-source-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP6 + + + kernel-devel-rt as a component of SUSE Linux Enterprise Real Time 12 SP5 + + + kernel-source-rt as a component of SUSE Linux Enterprise Real Time 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default-base as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-source as a component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP4-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-devel-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-source-azure as a component of SUSE Linux Enterprise Server 12 SP5-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP1-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default-base as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default-devel as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default-man as a component of SUSE Linux Enterprise Server 15-LTSS + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-devel as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-macros as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server 15-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS + + + kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + + kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + + + kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 + + + kernel-default-extra as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-default as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + + kernel-default as a component of SUSE Manager Proxy 4.3 + + + kernel-default-devel as a component of SUSE Manager Proxy 4.3 + + + kernel-devel as a component of SUSE Manager Proxy 4.3 + + + kernel-macros as a component of SUSE Manager Proxy 4.3 + + + kernel-source as a component of SUSE Manager Proxy 4.3 + + + kernel-default as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-devel as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-macros as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-source as a component of SUSE Manager Retail Branch Server 4.3 + + + kernel-default as a component of SUSE Manager Server 4.3 + + + kernel-default-devel as a component of SUSE Manager Server 4.3 + + + kernel-devel as a component of SUSE Manager Server 4.3 + + + kernel-macros as a component of SUSE Manager Server 4.3 + + + kernel-source as a component of SUSE Manager Server 4.3 + + + kernel-devel-rt as a component of SUSE Real Time Module 15 SP5 + + + kernel-source-rt as a component of SUSE Real Time Module 15 SP5 + + + cluster-md-kmp-default as a component of openSUSE Leap 15.5 + + + dlm-kmp-default as a component of openSUSE Leap 15.5 + + + gfs2-kmp-default as a component of openSUSE Leap 15.5 + + + kernel-default as a component of openSUSE Leap 15.5 + + + kernel-default-devel as a component of openSUSE Leap 15.5 + + + kernel-default-extra as a component of openSUSE Leap 15.5 + + + kernel-default-livepatch as a component of openSUSE Leap 15.5 + + + kernel-default-livepatch-devel as a component of openSUSE Leap 15.5 + + + kernel-default-optional as a component of openSUSE Leap 15.5 + + + kernel-default-vdso as a component of openSUSE Leap 15.5 + + + kselftests-kmp-default as a component of openSUSE Leap 15.5 + + + ocfs2-kmp-default as a component of openSUSE Leap 15.5 + + + reiserfs-kmp-default as a component of openSUSE Leap 15.5 + + + kernel-devel as a component of openSUSE Leap 15.5 + + + kernel-macros as a component of openSUSE Leap 15.5 + + + kernel-source as a component of openSUSE Leap 15.5 + + + kernel-source-vanilla as a component of openSUSE Leap 15.5 + + + kernel-devel-rt as a component of openSUSE Leap 15.5 + + + kernel-source-rt as a component of openSUSE Leap 15.5 + + + cluster-md-kmp-default as a component of openSUSE Leap 15.6 + + + dlm-kmp-default as a component of openSUSE Leap 15.6 + + + gfs2-kmp-default as a component of openSUSE Leap 15.6 + + + kernel-default as a component of openSUSE Leap 15.6 + + + kernel-default-devel as a component of openSUSE Leap 15.6 + + + kernel-default-extra as a component of openSUSE Leap 15.6 + + + kernel-default-livepatch as a component of openSUSE Leap 15.6 + + + kernel-default-livepatch-devel as a component of openSUSE Leap 15.6 + + + kernel-default-optional as a component of openSUSE Leap 15.6 + + + kernel-default-vdso as a component of openSUSE Leap 15.6 + + + kselftests-kmp-default as a component of openSUSE Leap 15.6 + + + ocfs2-kmp-default as a component of openSUSE Leap 15.6 + + + reiserfs-kmp-default as a component of openSUSE Leap 15.6 + + + kernel-devel as a component of openSUSE Leap 15.6 + + + kernel-macros as a component of openSUSE Leap 15.6 + + + kernel-source as a component of openSUSE Leap 15.6 + + + kernel-source-vanilla as a component of openSUSE Leap 15.6 + + + kernel-devel-rt as a component of openSUSE Leap 15.6 + + + kernel-source-rt as a component of openSUSE Leap 15.6 + + In the Linux kernel, the following vulnerability has been resolved: @@ -83,11 +1306,26 @@ Rule: add CVE-2024-50006 - + + + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source + SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default + SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source + + moderate + + + 4.7 + CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H + + skipping CVE-2024-50005 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50003 as CVE page is older than CVRF-CVE file. skipping CVE-2024-50002 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49999 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49998 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49997 as CVE page is older than CVRF-CVE file. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. skipping CVE-2024-49984 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49983 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49980 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49979 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49978 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49974 as CVE page is older than CVRF-CVE file. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. skipping CVE-2024-49965 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49964 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49963 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49960.xml 2024-10-26 01:10:35.989124000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49960.xml.new 2024-10-29 01:11:09.848240000 +0100 @@ -14,13 +14,13 @@ 1 - 1 - 2024-10-25T23:10:35Z + 2 + 2024-10-29T00:11:09Z current 2024-10-25T23:10:35Z - 2024-10-25T23:10:35Z + 2024-10-29T00:11:09Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -75,11 +75,6 @@ SUSE Linux Enterprise High Availability Extension 12 SP5 - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -212,35 +207,17 @@ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise Server 12 SP2-LTSS - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise Server 12 SP4-LTSS - - SUSE Linux Enterprise Module for Public Cloud 12 - SUSE Linux Enterprise Server 12 SP5 @@ -318,25 +295,7 @@ SUSE Linux Enterprise Server Teradata 15 SP4 - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - SUSE Linux Enterprise Module for Public Cloud 12 - SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -775,12 +734,6 @@ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 - - kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12 - - - kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12 - kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 skipping CVE-2024-49956 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49954 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49951 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49950 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49948 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49947 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49945 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49944 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49943 as CVE page is older than CVRF-CVE file. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. skipping CVE-2024-49934 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49933 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49932 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49927 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49924 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49923 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49922 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49921 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49914 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49912 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49911 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49910 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49909 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49908 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49907 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49906 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49905 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49904 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49903 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49902.xml 2024-10-26 01:10:51.232326000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49902.xml.new 2024-10-29 01:11:27.431258000 +0100 @@ -14,13 +14,13 @@ 1 - 1 - 2024-10-25T23:10:50Z + 2 + 2024-10-29T00:11:26Z current 2024-10-25T23:10:50Z - 2024-10-25T23:10:50Z + 2024-10-29T00:11:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1293,10 +1293,45 @@ SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source-azure + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source + SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-default-devel + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-devel + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-macros + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kernel-source + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:reiserfs-kmp-default + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-default-devel + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-devel + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-macros + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kernel-source + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:reiserfs-kmp-default SUSE Linux Enterprise Live Patching 12 SP5:kernel-default SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel SUSE Linux Enterprise Live Patching 12 SP5:kernel-source + SUSE Linux Enterprise Live Patching 15 SP2:kernel-default + SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch + SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel + SUSE Linux Enterprise Live Patching 15 SP2:kernel-source + SUSE Linux Enterprise Live Patching 15 SP3:kernel-default + SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch + SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel + SUSE Linux Enterprise Live Patching 15 SP3:kernel-source + SUSE Linux Enterprise Live Patching 15 SP4:kernel-default + SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch + SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel + SUSE Linux Enterprise Live Patching 15 SP4:kernel-source SUSE Linux Enterprise Live Patching 15 SP5:kernel-default SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch SUSE Linux Enterprise Live Patching 15 SP5:kernel-default-livepatch-devel @@ -1305,8 +1340,26 @@ SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel SUSE Linux Enterprise Live Patching 15 SP6:kernel-source + SUSE Linux Enterprise Micro 5.0:kernel-default + SUSE Linux Enterprise Micro 5.1:kernel-default + SUSE Linux Enterprise Micro 5.1:kernel-rt + SUSE Linux Enterprise Micro 5.1:kernel-source + SUSE Linux Enterprise Micro 5.1:kernel-source-rt + SUSE Linux Enterprise Micro 5.2:kernel-default + SUSE Linux Enterprise Micro 5.2:kernel-rt + SUSE Linux Enterprise Micro 5.2:kernel-source + SUSE Linux Enterprise Micro 5.2:kernel-source-rt + SUSE Linux Enterprise Micro 5.3:kernel-default + SUSE Linux Enterprise Micro 5.3:kernel-rt + SUSE Linux Enterprise Micro 5.3:kernel-source + SUSE Linux Enterprise Micro 5.3:kernel-source-rt + SUSE Linux Enterprise Micro 5.4:kernel-default + SUSE Linux Enterprise Micro 5.4:kernel-rt + SUSE Linux Enterprise Micro 5.4:kernel-source + SUSE Linux Enterprise Micro 5.4:kernel-source-rt SUSE Linux Enterprise Micro 5.5:kernel-default SUSE Linux Enterprise Micro 5.5:kernel-source + SUSE Linux Enterprise Micro 5.5:kernel-source-rt SUSE Linux Enterprise Micro 6.0:kernel-default SUSE Linux Enterprise Micro 6.0:kernel-devel SUSE Linux Enterprise Micro 6.0:kernel-devel-rt @@ -1335,6 +1388,12 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source + SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default + SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel @@ -1367,18 +1426,89 @@ SUSE Linux Enterprise Server 12 SP5:kernel-macros SUSE Linux Enterprise Server 12 SP5:kernel-source SUSE Linux Enterprise Server 12 SP5:kernel-source-azure + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros + SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source + SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros + SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source + SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros + SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source + SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default + SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-devel + SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-macros + SUSE Linux Enterprise Server 15 SP4-LTSS:kernel-source + SUSE Linux Enterprise Server 15 SP4-LTSS:reiserfs-kmp-default + SUSE Linux Enterprise Server 15-LTSS:kernel-default + SUSE Linux Enterprise Server 15-LTSS:kernel-default-base + SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel + SUSE Linux Enterprise Server 15-LTSS:kernel-default-man + SUSE Linux Enterprise Server 15-LTSS:kernel-devel + SUSE Linux Enterprise Server 15-LTSS:kernel-macros + SUSE Linux Enterprise Server 15-LTSS:kernel-source + SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:kernel-default SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:kernel-source SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source + SUSE Linux Enterprise Server Teradata 15 SP4:kernel-default + SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros + SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source + SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros + SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source + SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default + SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default + SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-default-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-devel + SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-macros + SUSE Linux Enterprise Server for SAP Applications 15 SP4:kernel-source + SUSE Linux Enterprise Server for SAP Applications 15 SP4:reiserfs-kmp-default SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-default SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-source SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-source + SUSE Manager Proxy 4.3:kernel-default + SUSE Manager Proxy 4.3:kernel-default-devel + SUSE Manager Proxy 4.3:kernel-devel + SUSE Manager Proxy 4.3:kernel-macros + SUSE Manager Proxy 4.3:kernel-source + SUSE Manager Retail Branch Server 4.3:kernel-default + SUSE Manager Retail Branch Server 4.3:kernel-default-devel + SUSE Manager Retail Branch Server 4.3:kernel-devel + SUSE Manager Retail Branch Server 4.3:kernel-macros + SUSE Manager Retail Branch Server 4.3:kernel-source + SUSE Manager Server 4.3:kernel-default + SUSE Manager Server 4.3:kernel-default-devel + SUSE Manager Server 4.3:kernel-devel + SUSE Manager Server 4.3:kernel-macros + SUSE Manager Server 4.3:kernel-source + SUSE Real Time Module 15 SP5:kernel-devel-rt + SUSE Real Time Module 15 SP5:kernel-source-rt openSUSE Leap 15.5:cluster-md-kmp-default openSUSE Leap 15.5:dlm-kmp-default openSUSE Leap 15.5:gfs2-kmp-default @@ -1390,12 +1520,33 @@ openSUSE Leap 15.5:kernel-default-optional openSUSE Leap 15.5:kernel-default-vdso openSUSE Leap 15.5:kernel-devel + openSUSE Leap 15.5:kernel-devel-rt openSUSE Leap 15.5:kernel-macros openSUSE Leap 15.5:kernel-source + openSUSE Leap 15.5:kernel-source-rt openSUSE Leap 15.5:kernel-source-vanilla openSUSE Leap 15.5:kselftests-kmp-default openSUSE Leap 15.5:ocfs2-kmp-default openSUSE Leap 15.5:reiserfs-kmp-default + openSUSE Leap 15.6:cluster-md-kmp-default + openSUSE Leap 15.6:dlm-kmp-default + openSUSE Leap 15.6:gfs2-kmp-default + openSUSE Leap 15.6:kernel-default + openSUSE Leap 15.6:kernel-default-devel + openSUSE Leap 15.6:kernel-default-extra + openSUSE Leap 15.6:kernel-default-livepatch + openSUSE Leap 15.6:kernel-default-livepatch-devel + openSUSE Leap 15.6:kernel-default-optional + openSUSE Leap 15.6:kernel-default-vdso + openSUSE Leap 15.6:kernel-devel + openSUSE Leap 15.6:kernel-devel-rt + openSUSE Leap 15.6:kernel-macros + openSUSE Leap 15.6:kernel-source + openSUSE Leap 15.6:kernel-source-rt + openSUSE Leap 15.6:kernel-source-vanilla + openSUSE Leap 15.6:kselftests-kmp-default + openSUSE Leap 15.6:ocfs2-kmp-default + openSUSE Leap 15.6:reiserfs-kmp-default skipping CVE-2024-49900 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49899 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49897 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49894 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49893 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49888 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49887 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49885 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49879 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49878 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49877 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49876 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49871 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49870 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49868 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49866 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49865 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49863 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49861 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49860.xml 2024-10-22 01:11:32.752702000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-49860.xml.new 2024-10-29 01:11:39.497221000 +0100 @@ -14,13 +14,13 @@ 1 - 1 - 2024-10-21T23:11:32Z + 2 + 2024-10-29T00:11:39Z current 2024-10-21T23:11:32Z - 2024-10-21T23:11:32Z + 2024-10-29T00:11:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -59,11 +59,6 @@ SUSE Linux Enterprise High Availability Extension 12 SP5 - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -196,35 +191,17 @@ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise Server 12 SP2-LTSS - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise Server 12 SP4-LTSS - - SUSE Linux Enterprise Module for Public Cloud 12 - SUSE Linux Enterprise Server 12 SP5 @@ -302,25 +279,7 @@ SUSE Linux Enterprise Server Teradata 15 SP4 - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - SUSE Linux Enterprise Module for Public Cloud 12 - SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -759,12 +718,6 @@ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 - - kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12 - - - kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12 - kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 skipping CVE-2024-49859 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49858 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49857 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49856 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49854 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49853 as CVE page is older than CVRF-CVE file. skipping CVE-2024-49852 as CVE page is older than CVRF-CVE file. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. skipping CVE-2024-49195 as CVE page is older than CVRF-CVE file. skipping CVE-2024-48958 as CVE page is older than CVRF-CVE file. skipping CVE-2024-48957 as CVE page is older than CVRF-CVE file. skipping CVE-2024-48949 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-48948.xml 2024-10-24 01:10:55.534056000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-48948.xml.new 2024-10-29 01:11:43.119955000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-23T23:10:55Z + 3 + 2024-10-29T00:11:42Z current 2024-10-15T23:10:24Z - 2024-10-23T23:10:55Z + 2024-10-29T00:11:42Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -247,6 +247,11 @@ openSUSE Leap 15.6 + + + openSUSE Tumbleweed + + cockpit @@ -421,12 +426,30 @@ pgadmin4-web-uwsgi-8.5-150600.3.6.1 + + python310-pytest-html-4.1.1-3.1 + + + python311-pytest-html-4.1.1-3.1 + + + python312-pytest-html-4.1.1-3.1 + system-user-pgadmin system-user-pgadmin-8.5-150600.3.6.1 + + python310-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed + + + python311-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed + + + python312-pytest-html-4.1.1-3.1 as a component of openSUSE Tumbleweed + pgadmin4-8.5-150600.3.6.1 as a component of SUSE Linux Enterprise Module for Python 3 15 SP6 @@ -1349,6 +1372,11 @@ CVE-2024-48948 + + openSUSE Tumbleweed:python310-pytest-html-4.1.1-3.1 + openSUSE Tumbleweed:python311-pytest-html-4.1.1-3.1 + openSUSE Tumbleweed:python312-pytest-html-4.1.1-3.1 + SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-8.5-150600.3.6.1 SUSE Linux Enterprise Module for Python 3 15 SP6:pgadmin4-doc-8.5-150600.3.6.1 skipping CVE-2024-48426 as CVE page is older than CVRF-CVE file. skipping CVE-2024-48425 as CVE page is older than CVRF-CVE file. skipping CVE-2024-48424 as CVE page is older than CVRF-CVE file. skipping CVE-2024-48423 as CVE page is older than CVRF-CVE file. skipping CVE-2024-48208 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47875 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47874 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47871 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47869 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47868 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47850 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47814 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-47757.xml 2024-10-24 01:11:00.286808000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-47757.xml.new 2024-10-29 01:11:46.330224000 +0100 @@ -14,13 +14,13 @@ 1 - 3 - 2024-10-23T23:10:59Z + 4 + 2024-10-29T00:11:45Z current 2024-10-21T23:11:45Z - 2024-10-23T23:10:59Z + 2024-10-29T00:11:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -71,11 +71,6 @@ SUSE Linux Enterprise High Availability Extension 12 SP5 - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -208,35 +203,17 @@ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise Server 12 SP2-LTSS - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise Server 12 SP4-LTSS - - SUSE Linux Enterprise Module for Public Cloud 12 - SUSE Linux Enterprise Server 12 SP5 @@ -314,25 +291,7 @@ SUSE Linux Enterprise Server Teradata 15 SP4 - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - SUSE Linux Enterprise Module for Public Cloud 12 - SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -771,12 +730,6 @@ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 - - kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12 - - - kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12 - kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 skipping CVE-2024-47754 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47752 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47749 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47748 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47746 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47743 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47734 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47731 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47725 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47669 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47611 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-47516 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/47xxxx/CVE-2024-47516.json:No such file or directory No V5 entry found for CVE-2024-47515 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/47xxxx/CVE-2024-47515.json:No such file or directory skipping CVE-2024-47220 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47177 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47176 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47175 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47168 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47167 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47166 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47165 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47164 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47084 as CVE page is older than CVRF-CVE file. skipping CVE-2024-47076 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-46956 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46956.json:No such file or directory --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46956.xml 2024-10-25 01:12:00.560008000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46956.xml.new 2024-10-29 01:12:25.709205000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-24T23:12:00Z + 3 + 2024-10-29T00:12:25Z current 2024-10-23T23:11:29Z - 2024-10-24T23:12:00Z + 2024-10-29T00:12:25Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -497,8 +497,14 @@ - low + important + + + 7.8 + CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + + No V5 entry found for CVE-2024-46955 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46955.json:No such file or directory --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46955.xml 2024-10-25 01:12:01.259935000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46955.xml.new 2024-10-29 01:12:26.697154000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-24T23:12:00Z + 3 + 2024-10-29T00:12:26Z current 2024-10-23T23:11:29Z - 2024-10-24T23:12:00Z + 2024-10-29T00:12:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -500,8 +500,14 @@ - low + moderate + + + 5.5 + CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H + + No V5 entry found for CVE-2024-46954 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46954.json:No such file or directory No V5 entry found for CVE-2024-46953 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46953.json:No such file or directory --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46953.xml 2024-10-25 01:12:02.616856000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46953.xml.new 2024-10-29 01:12:27.774074000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-24T23:12:02Z + 3 + 2024-10-29T00:12:27Z current 2024-10-23T23:11:30Z - 2024-10-24T23:12:02Z + 2024-10-29T00:12:27Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -497,8 +497,14 @@ - low + important + + + 7.8 + CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + + No V5 entry found for CVE-2024-46952 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46952.json:No such file or directory --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46952.xml 2024-10-25 01:12:03.303313000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46952.xml.new 2024-10-29 01:12:28.397027000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-24T23:12:02Z + 3 + 2024-10-29T00:12:28Z current 2024-10-23T23:11:30Z - 2024-10-24T23:12:02Z + 2024-10-29T00:12:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -575,8 +575,14 @@ - low + important + + + 7.8 + CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + + No V5 entry found for CVE-2024-46951 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/46xxxx/CVE-2024-46951.json:No such file or directory --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46951.xml 2024-10-25 01:12:03.976276000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46951.xml.new 2024-10-29 01:12:29.169988000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-24T23:12:03Z + 3 + 2024-10-29T00:12:28Z current 2024-10-23T23:11:31Z - 2024-10-24T23:12:03Z + 2024-10-29T00:12:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -500,8 +500,14 @@ - low + important + + + 7.8 + CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H + + skipping CVE-2024-46869 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46868 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46867 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46866 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46865 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46864 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46863 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46862 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46860 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46859.xml 2024-10-16 01:10:51.649646000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46859.xml.new 2024-10-29 01:12:31.488940000 +0100 @@ -14,13 +14,13 @@ 1 - 9 - 2024-10-15T23:10:51Z + 10 + 2024-10-29T00:12:30Z current 2024-09-27T23:10:26Z - 2024-10-15T23:10:51Z + 2024-10-29T00:12:30Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -68,6 +68,21 @@ + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -372,6 +387,253 @@ openSUSE Leap 15.6 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + cluster-md-kmp-default @@ -552,6 +814,39 @@ reiserfs-kmp-default + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 @@ -1406,6 +1701,17 @@ CVE-2024-46859 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1 @@ -1544,6 +1850,229 @@ openSUSE Leap 15.6:ocfs2-kmp-default openSUSE Leap 15.6:reiserfs-kmp-default + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + skipping CVE-2024-46858 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46857 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46856 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46855 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46854.xml 2024-10-16 01:10:56.290912000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46854.xml.new 2024-10-29 01:12:32.105898000 +0100 @@ -14,13 +14,13 @@ 1 - 9 - 2024-10-15T23:10:55Z + 10 + 2024-10-29T00:12:31Z current 2024-09-27T23:10:28Z - 2024-10-15T23:10:55Z + 2024-10-29T00:12:31Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -63,6 +63,21 @@ + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -367,6 +382,253 @@ openSUSE Leap 15.6 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + cluster-md-kmp-azure-5.14.21-150500.33.69.1 @@ -592,6 +854,39 @@ reiserfs-kmp-default + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 @@ -1467,6 +1762,17 @@ CVE-2024-46854 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1 @@ -1572,6 +1878,229 @@ SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46853.xml 2024-10-22 01:12:48.489747000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46853.xml.new 2024-10-29 01:12:33.113834000 +0100 @@ -14,13 +14,13 @@ 1 - 8 - 2024-10-21T23:12:48Z + 9 + 2024-10-29T00:12:32Z current 2024-09-27T23:10:28Z - 2024-10-21T23:12:48Z + 2024-10-29T00:12:32Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -132,6 +132,21 @@ + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -436,6 +451,253 @@ openSUSE Leap 15.6 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + cluster-md-kmp-default @@ -616,6 +878,39 @@ reiserfs-kmp-default + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 @@ -1528,6 +1823,17 @@ CVE-2024-46853 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1 @@ -1666,6 +1972,229 @@ openSUSE Leap 15.6:ocfs2-kmp-default openSUSE Leap 15.6:reiserfs-kmp-default + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + skipping CVE-2024-46852 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46851 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46850 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46849 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46848 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46847 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46846 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46845 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46844 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46843 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46842 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46841 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46840 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46839 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46838 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46837 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46836 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46835 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46834 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46833 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46832 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46831.xml 2024-10-19 01:11:41.236926000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46831.xml.new 2024-10-29 01:12:33.825242000 +0100 @@ -14,13 +14,13 @@ 1 - 6 - 2024-10-18T23:11:40Z + 7 + 2024-10-29T00:12:33Z current 2024-09-27T23:10:35Z - 2024-10-18T23:11:40Z + 2024-10-29T00:12:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -835,24 +835,9 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -1251,11 +1236,6 @@ SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source-azure SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46830.xml 2024-10-22 01:13:07.188759000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46830.xml.new 2024-10-29 01:12:35.186314000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-21T23:13:06Z + 13 + 2024-10-29T00:12:34Z current 2024-09-27T23:10:35Z - 2024-10-21T23:13:06Z + 2024-10-29T00:12:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -191,16 +191,6 @@ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - - - SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -241,11 +231,6 @@ SUSE Linux Enterprise Live Patching 15 SP3 - - - SUSE Linux Enterprise Live Patching 15 SP4 - - SUSE Linux Enterprise Live Patching 15 SP5 @@ -271,16 +256,6 @@ SUSE Linux Enterprise Micro 5.2 - - - SUSE Linux Enterprise Micro 5.3 - - - - - SUSE Linux Enterprise Micro 5.4 - - SUSE Linux Enterprise Micro 5.5 @@ -347,11 +322,6 @@ SUSE Linux Enterprise Server 15 SP3-LTSS - - - SUSE Linux Enterprise Server 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -395,11 +365,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - - SUSE Linux Enterprise Server Teradata 15 SP4 - - SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -421,11 +386,6 @@ SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -454,21 +414,6 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6 - - - SUSE Manager Proxy 4.3 - - - - - SUSE Manager Retail Branch Server 4.3 - - - - - SUSE Manager Server 4.3 - - openSUSE Leap 15.5 @@ -1664,42 +1609,6 @@ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5 @@ -1736,18 +1645,6 @@ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4 - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6 @@ -1787,30 +1684,6 @@ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2 - - kernel-default as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-default as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4 - kernel-default as a component of SUSE Linux Enterprise Micro 5.5 @@ -2015,24 +1888,6 @@ kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS @@ -2069,12 +1924,6 @@ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -2120,24 +1969,6 @@ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 @@ -2153,51 +1984,6 @@ kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 - - kernel-default as a component of SUSE Manager Proxy 4.3 - - - kernel-default-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-macros as a component of SUSE Manager Proxy 4.3 - - - kernel-source as a component of SUSE Manager Proxy 4.3 - - - kernel-default as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-macros as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-source as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default as a component of SUSE Manager Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Server 4.3 - - - kernel-devel as a component of SUSE Manager Server 4.3 - - - kernel-macros as a component of SUSE Manager Server 4.3 - - - kernel-source as a component of SUSE Manager Server 4.3 - cluster-md-kmp-default as a component of openSUSE Leap 15.6 notsure where SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 is contained? no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46822 skipping CVE-2024-46829 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46828 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46827 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46826 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46825 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46824 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46823 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46822.xml 2024-10-16 01:11:17.399849000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46822.xml.new 2024-10-29 01:12:36.595131000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-15T23:11:16Z + 13 + 2024-10-29T00:12:35Z current 2024-09-27T23:10:38Z - 2024-10-15T23:11:16Z + 2024-10-29T00:12:35Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -116,6 +116,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1583,6 +1598,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3136,6 +3184,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46821.xml 2024-10-22 01:13:14.292938000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46821.xml.new 2024-10-29 01:12:37.847143000 +0100 @@ -14,13 +14,13 @@ 1 - 9 - 2024-10-21T23:13:13Z + 10 + 2024-10-29T00:12:36Z current 2024-09-27T23:10:38Z - 2024-10-21T23:13:13Z + 2024-10-29T00:12:36Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -76,21 +76,6 @@ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS - - - SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - - - SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - - - SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -123,16 +108,6 @@ SUSE Linux Enterprise Live Patching 15 SP2 - - - SUSE Linux Enterprise Live Patching 15 SP3 - - - - - SUSE Linux Enterprise Live Patching 15 SP4 - - SUSE Linux Enterprise Live Patching 15 SP5 @@ -148,26 +123,6 @@ SUSE Linux Enterprise Micro 5.0 - - - SUSE Linux Enterprise Micro 5.1 - - - - - SUSE Linux Enterprise Micro 5.2 - - - - - SUSE Linux Enterprise Micro 5.3 - - - - - SUSE Linux Enterprise Micro 5.4 - - SUSE Linux Enterprise Micro 5.5 @@ -229,16 +184,6 @@ SUSE Linux Enterprise Server 15 SP2-LTSS - - - SUSE Linux Enterprise Server 15 SP3-LTSS - - - - - SUSE Linux Enterprise Server 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -276,11 +221,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - - SUSE Linux Enterprise Server Teradata 15 SP4 - - SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -297,16 +237,6 @@ SUSE Linux Enterprise Server for SAP Applications 15 SP2 - - - SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - - - SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -329,21 +259,6 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6 - - - SUSE Manager Proxy 4.3 - - - - - SUSE Manager Retail Branch Server 4.3 - - - - - SUSE Manager Server 4.3 - - openSUSE Leap 15.5 @@ -408,9 +323,6 @@ kernel-macros - - kernel-rt - kernel-source @@ -474,60 +386,6 @@ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5 @@ -552,30 +410,6 @@ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2 - - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - - kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - - kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - - kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4 - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5 @@ -603,54 +437,6 @@ kernel-default as a component of SUSE Linux Enterprise Micro 5.0 - - kernel-default as a component of SUSE Linux Enterprise Micro 5.1 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.1 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.1 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1 - - - kernel-default as a component of SUSE Linux Enterprise Micro 5.2 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.2 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.2 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2 - - - kernel-default as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-default as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4 - kernel-default as a component of SUSE Linux Enterprise Micro 5.5 @@ -867,42 +653,6 @@ kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS @@ -939,12 +689,6 @@ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -972,42 +716,6 @@ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 - - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 @@ -1023,51 +731,6 @@ kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 - - kernel-default as a component of SUSE Manager Proxy 4.3 - - - kernel-default-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-macros as a component of SUSE Manager Proxy 4.3 - - - kernel-source as a component of SUSE Manager Proxy 4.3 - - - kernel-default as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-macros as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-source as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default as a component of SUSE Manager Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Server 4.3 - - - kernel-devel as a component of SUSE Manager Server 4.3 - - - kernel-macros as a component of SUSE Manager Server 4.3 - - - kernel-source as a component of SUSE Manager Server 4.3 - kernel-devel-rt as a component of SUSE Real Time Module 15 SP5 skipping CVE-2024-46820 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46819 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46818 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46817 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46816 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46815 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46812.xml 2024-10-22 01:13:21.694008000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46812.xml.new 2024-10-29 01:12:39.390022000 +0100 @@ -14,13 +14,13 @@ 1 - 9 - 2024-10-21T23:13:21Z + 10 + 2024-10-29T00:12:39Z current 2024-09-27T23:10:40Z - 2024-10-21T23:13:21Z + 2024-10-29T00:12:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -77,21 +77,6 @@ SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS - - - SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - - - SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - - - SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -124,16 +109,6 @@ SUSE Linux Enterprise Live Patching 15 SP2 - - - SUSE Linux Enterprise Live Patching 15 SP3 - - - - - SUSE Linux Enterprise Live Patching 15 SP4 - - SUSE Linux Enterprise Live Patching 15 SP5 @@ -149,26 +124,6 @@ SUSE Linux Enterprise Micro 5.0 - - - SUSE Linux Enterprise Micro 5.1 - - - - - SUSE Linux Enterprise Micro 5.2 - - - - - SUSE Linux Enterprise Micro 5.3 - - - - - SUSE Linux Enterprise Micro 5.4 - - SUSE Linux Enterprise Micro 5.5 @@ -230,16 +185,6 @@ SUSE Linux Enterprise Server 15 SP2-LTSS - - - SUSE Linux Enterprise Server 15 SP3-LTSS - - - - - SUSE Linux Enterprise Server 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -277,11 +222,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - - SUSE Linux Enterprise Server Teradata 15 SP4 - - SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -298,16 +238,6 @@ SUSE Linux Enterprise Server for SAP Applications 15 SP2 - - - SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - - - SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -330,21 +260,6 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6 - - - SUSE Manager Proxy 4.3 - - - - - SUSE Manager Retail Branch Server 4.3 - - - - - SUSE Manager Server 4.3 - - openSUSE Leap 15.5 @@ -409,9 +324,6 @@ kernel-macros - - kernel-rt - kernel-source @@ -475,60 +387,6 @@ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5 @@ -553,30 +411,6 @@ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP2 - - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - - kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - - kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - - kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4 - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5 @@ -604,54 +438,6 @@ kernel-default as a component of SUSE Linux Enterprise Micro 5.0 - - kernel-default as a component of SUSE Linux Enterprise Micro 5.1 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.1 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.1 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.1 - - - kernel-default as a component of SUSE Linux Enterprise Micro 5.2 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.2 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.2 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2 - - - kernel-default as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-default as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4 - kernel-default as a component of SUSE Linux Enterprise Micro 5.5 @@ -868,42 +654,6 @@ kernel-source as a component of SUSE Linux Enterprise Server 15 SP2-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - - kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS @@ -940,12 +690,6 @@ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -973,42 +717,6 @@ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 - - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 @@ -1024,51 +732,6 @@ kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 - - kernel-default as a component of SUSE Manager Proxy 4.3 - - - kernel-default-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-macros as a component of SUSE Manager Proxy 4.3 - - - kernel-source as a component of SUSE Manager Proxy 4.3 - - - kernel-default as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-macros as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-source as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default as a component of SUSE Manager Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Server 4.3 - - - kernel-devel as a component of SUSE Manager Server 4.3 - - - kernel-macros as a component of SUSE Manager Server 4.3 - - - kernel-source as a component of SUSE Manager Server 4.3 - kernel-devel-rt as a component of SUSE Real Time Module 15 SP5 skipping CVE-2024-46810 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46809 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46808 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46807.xml 2024-10-22 01:13:25.947862000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46807.xml.new 2024-10-29 01:12:40.600887000 +0100 @@ -14,13 +14,13 @@ 1 - 9 - 2024-10-21T23:13:25Z + 10 + 2024-10-29T00:12:40Z current 2024-09-27T23:10:42Z - 2024-10-21T23:13:25Z + 2024-10-29T00:12:40Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -78,16 +78,6 @@ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - - - SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -125,11 +115,6 @@ SUSE Linux Enterprise Live Patching 15 SP3 - - - SUSE Linux Enterprise Live Patching 15 SP4 - - SUSE Linux Enterprise Live Patching 15 SP5 @@ -155,16 +140,6 @@ SUSE Linux Enterprise Micro 5.2 - - - SUSE Linux Enterprise Micro 5.3 - - - - - SUSE Linux Enterprise Micro 5.4 - - SUSE Linux Enterprise Micro 5.5 @@ -231,11 +206,6 @@ SUSE Linux Enterprise Server 15 SP3-LTSS - - - SUSE Linux Enterprise Server 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -273,11 +243,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - - SUSE Linux Enterprise Server Teradata 15 SP4 - - SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -299,11 +264,6 @@ SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -326,21 +286,6 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6 - - - SUSE Manager Proxy 4.3 - - - - - SUSE Manager Retail Branch Server 4.3 - - - - - SUSE Manager Server 4.3 - - openSUSE Leap 15.5 @@ -489,42 +434,6 @@ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5 @@ -561,18 +470,6 @@ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4 - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5 @@ -624,30 +521,6 @@ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2 - - kernel-default as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-default as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4 - kernel-default as a component of SUSE Linux Enterprise Micro 5.5 @@ -882,24 +755,6 @@ kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS @@ -936,12 +791,6 @@ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -987,24 +836,6 @@ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 @@ -1020,51 +851,6 @@ kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 - - kernel-default as a component of SUSE Manager Proxy 4.3 - - - kernel-default-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-macros as a component of SUSE Manager Proxy 4.3 - - - kernel-source as a component of SUSE Manager Proxy 4.3 - - - kernel-default as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-macros as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-source as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default as a component of SUSE Manager Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Server 4.3 - - - kernel-devel as a component of SUSE Manager Server 4.3 - - - kernel-macros as a component of SUSE Manager Server 4.3 - - - kernel-source as a component of SUSE Manager Server 4.3 - kernel-devel-rt as a component of SUSE Real Time Module 15 SP5 skipping CVE-2024-46806 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46805 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46804.xml 2024-10-22 01:13:28.640160000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46804.xml.new 2024-10-29 01:12:41.331860000 +0100 @@ -14,13 +14,13 @@ 1 - 9 - 2024-10-21T23:13:28Z + 10 + 2024-10-29T00:12:40Z current 2024-09-27T23:10:43Z - 2024-10-21T23:13:28Z + 2024-10-29T00:12:40Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -83,16 +83,6 @@ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - - SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - - - SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -130,11 +120,6 @@ SUSE Linux Enterprise Live Patching 15 SP3 - - - SUSE Linux Enterprise Live Patching 15 SP4 - - SUSE Linux Enterprise Live Patching 15 SP5 @@ -160,16 +145,6 @@ SUSE Linux Enterprise Micro 5.2 - - - SUSE Linux Enterprise Micro 5.3 - - - - - SUSE Linux Enterprise Micro 5.4 - - SUSE Linux Enterprise Micro 5.5 @@ -236,11 +211,6 @@ SUSE Linux Enterprise Server 15 SP3-LTSS - - - SUSE Linux Enterprise Server 15 SP4-LTSS - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -278,11 +248,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - - SUSE Linux Enterprise Server Teradata 15 SP4 - - SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -304,11 +269,6 @@ SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - - SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -331,21 +291,6 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6 - - - SUSE Manager Proxy 4.3 - - - - - SUSE Manager Retail Branch Server 4.3 - - - - - SUSE Manager Server 4.3 - - openSUSE Leap 15.5 @@ -494,42 +439,6 @@ kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS - - - kernel-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - kernel-default-kgraft as a component of SUSE Linux Enterprise Live Patching 12 SP5 @@ -566,18 +475,6 @@ kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP3 - - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default-livepatch-devel as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-default as a component of SUSE Linux Enterprise Live Patching 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Live Patching 15 SP4 - kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP5 @@ -629,30 +526,6 @@ kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.2 - - kernel-default as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.3 - - - kernel-default as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-rt as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source as a component of SUSE Linux Enterprise Micro 5.4 - - - kernel-source-rt as a component of SUSE Linux Enterprise Micro 5.4 - kernel-default as a component of SUSE Linux Enterprise Micro 5.5 @@ -887,24 +760,6 @@ kernel-source as a component of SUSE Linux Enterprise Server 15 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-default-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-macros as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - - - kernel-source as a component of SUSE Linux Enterprise Server 15 SP4-LTSS - kernel-default as a component of SUSE Linux Enterprise Server 15-LTSS @@ -941,12 +796,6 @@ kernel-source as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - kernel-default as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server Teradata 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -992,24 +841,6 @@ kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 - - kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - reiserfs-kmp-default as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - - - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 - kernel-default as a component of SUSE Linux Enterprise Software Development Kit 12 SP5 @@ -1025,51 +856,6 @@ kernel-source as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 - - kernel-default as a component of SUSE Manager Proxy 4.3 - - - kernel-default-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-devel as a component of SUSE Manager Proxy 4.3 - - - kernel-macros as a component of SUSE Manager Proxy 4.3 - - - kernel-source as a component of SUSE Manager Proxy 4.3 - - - kernel-default as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-devel as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-macros as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-source as a component of SUSE Manager Retail Branch Server 4.3 - - - kernel-default as a component of SUSE Manager Server 4.3 - - - kernel-default-devel as a component of SUSE Manager Server 4.3 - - - kernel-devel as a component of SUSE Manager Server 4.3 - - - kernel-macros as a component of SUSE Manager Server 4.3 - - - kernel-source as a component of SUSE Manager Server 4.3 - kernel-devel-rt as a component of SUSE Real Time Module 15 SP5 skipping CVE-2024-46803 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46787 skipping CVE-2024-46801 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46800 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46799 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46798 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46797 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46796 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46795 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46794 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46793 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46792 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46791 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46790 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46789 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46788 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46787.xml 2024-10-16 01:11:38.617700000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46787.xml.new 2024-10-29 01:12:42.564821000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-15T23:11:38Z + 13 + 2024-10-29T00:12:41Z current 2024-09-18T23:10:06Z - 2024-10-15T23:11:38Z + 2024-10-29T00:12:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -185,6 +185,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1624,6 +1639,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3192,6 +3240,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46784 skipping CVE-2024-46786 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46785 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46784.xml 2024-10-22 01:13:45.829742000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46784.xml.new 2024-10-29 01:12:43.509251000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-21T23:13:45Z + 12 + 2024-10-29T00:12:42Z current 2024-09-18T23:10:06Z - 2024-10-21T23:13:45Z + 2024-10-29T00:12:42Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -127,6 +127,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1594,6 +1609,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3164,6 +3212,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46783 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46783.xml 2024-10-16 01:11:41.862533000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46783.xml.new 2024-10-29 01:12:44.278241000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-15T23:11:41Z + 13 + 2024-10-29T00:12:43Z current 2024-09-18T23:10:07Z - 2024-10-15T23:11:41Z + 2024-10-29T00:12:43Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -163,6 +163,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1602,6 +1617,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3148,6 +3196,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-46782 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46781 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46780 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46778 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46774 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-46774 skipping CVE-2024-46777 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46776 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46775 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46774.xml 2024-10-20 01:11:03.083794000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46774.xml.new 2024-10-29 01:12:46.367163000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-19T23:11:02Z + 13 + 2024-10-29T00:12:45Z current 2024-09-18T23:10:10Z - 2024-10-19T23:11:02Z + 2024-10-29T00:12:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -152,6 +152,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1860,6 +1875,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3774,18 +3822,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3831,6 +3867,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.136.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1 @@ -4430,10 +4477,6 @@ SUSE Linux Enterprise Micro 6.0:kernel-source SUSE Linux Enterprise Micro 6.0:kernel-source-rt SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-default SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-source no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46773 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46772 skipping CVE-2024-46771 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46770.xml 2024-10-16 01:11:48.772656000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46770.xml.new 2024-10-29 01:12:48.675996000 +0100 @@ -14,13 +14,13 @@ 1 - 7 - 2024-10-15T23:11:48Z + 8 + 2024-10-29T00:12:48Z current 2024-09-18T23:10:11Z - 2024-10-15T23:11:48Z + 2024-10-29T00:12:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -107,6 +107,21 @@ + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -411,6 +426,253 @@ openSUSE Leap 15.6 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + cluster-md-kmp-azure-5.14.21-150500.33.69.1 @@ -636,6 +898,39 @@ reiserfs-kmp-default + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 @@ -1555,6 +1850,17 @@ CVE-2024-46770 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1 @@ -1660,6 +1966,229 @@ SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + skipping CVE-2024-46768 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46767 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46766 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46765 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46764 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46763 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46761 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46761.xml 2024-10-17 01:11:00.653897000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46761.xml.new 2024-10-29 01:12:50.202917000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-16T23:11:00Z + 13 + 2024-10-29T00:12:49Z current 2024-09-18T23:10:13Z - 2024-10-16T23:11:00Z + 2024-10-29T00:12:49Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -118,6 +118,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1565,6 +1580,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3042,6 +3090,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46759 skipping CVE-2024-46760 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46759.xml 2024-10-22 01:14:05.267799000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46759.xml.new 2024-10-29 01:12:51.059867000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-21T23:14:04Z + 12 + 2024-10-29T00:12:50Z current 2024-09-18T23:10:14Z - 2024-10-21T23:14:04Z + 2024-10-29T00:12:50Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1405,6 +1420,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -2522,6 +2570,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46753 skipping CVE-2024-46758 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46757 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46756 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46755 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46754 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46753.xml 2024-10-16 01:11:56.266813000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46753.xml.new 2024-10-29 01:12:52.141800000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:11:55Z + 12 + 2024-10-29T00:12:51Z current 2024-09-18T23:10:15Z - 2024-10-15T23:11:55Z + 2024-10-29T00:12:51Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -108,6 +108,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1572,6 +1587,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3093,6 +3141,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46750 skipping CVE-2024-46752 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46751 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46750.xml 2024-10-17 01:11:04.282672000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46750.xml.new 2024-10-29 01:12:52.838771000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-16T23:11:03Z + 12 + 2024-10-29T00:12:52Z current 2024-09-18T23:10:16Z - 2024-10-16T23:11:03Z + 2024-10-29T00:12:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -140,6 +140,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1604,6 +1619,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3157,6 +3205,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46747 skipping CVE-2024-46749 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46748 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46746 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46745 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46745.xml 2024-10-22 01:14:20.405934000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46745.xml.new 2024-10-29 01:12:54.567171000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-21T23:14:19Z + 13 + 2024-10-29T00:12:54Z current 2024-09-18T23:10:17Z - 2024-10-21T23:14:19Z + 2024-10-29T00:12:54Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -116,6 +116,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1555,6 +1570,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3060,6 +3108,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46744 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46744.xml 2024-10-25 01:12:12.118884000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46744.xml.new 2024-10-29 01:12:55.262146000 +0100 @@ -14,13 +14,13 @@ 1 - 13 - 2024-10-24T23:12:11Z + 14 + 2024-10-29T00:12:54Z current 2024-09-18T23:10:18Z - 2024-10-24T23:12:11Z + 2024-10-29T00:12:54Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -132,6 +132,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1566,6 +1581,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3075,6 +3123,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46743 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46743.xml 2024-10-16 01:12:00.276578000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46743.xml.new 2024-10-29 01:12:55.961133000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-15T23:11:59Z + 13 + 2024-10-29T00:12:55Z current 2024-09-18T23:10:18Z - 2024-10-15T23:11:59Z + 2024-10-29T00:12:55Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -170,6 +170,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1549,6 +1564,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -2907,6 +2955,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46739 skipping CVE-2024-46742 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46741 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46740 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46739.xml 2024-10-22 01:14:27.280081000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46739.xml.new 2024-10-29 01:12:56.564107000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-21T23:14:26Z + 11 + 2024-10-29T00:12:56Z current 2024-09-18T23:10:19Z - 2024-10-21T23:14:26Z + 2024-10-29T00:12:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -112,6 +112,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1576,6 +1591,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3107,6 +3155,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46738 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46738.xml 2024-10-16 01:12:02.063474000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46738.xml.new 2024-10-29 01:12:57.282078000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:01Z + 11 + 2024-10-29T00:12:56Z current 2024-09-18T23:10:19Z - 2024-10-15T23:12:01Z + 2024-10-29T00:12:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -149,6 +149,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1613,6 +1628,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3175,6 +3223,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46737 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46737.xml 2024-10-16 01:12:02.704919000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46737.xml.new 2024-10-29 01:12:58.105994000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:02Z + 11 + 2024-10-29T00:12:57Z current 2024-09-18T23:10:19Z - 2024-10-15T23:12:02Z + 2024-10-29T00:12:57Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -116,6 +116,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1580,6 +1595,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3109,6 +3157,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-46736 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46735 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46734 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46731 skipping CVE-2024-46732 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46731.xml 2024-10-22 01:14:34.117744000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46731.xml.new 2024-10-29 01:12:59.046957000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-21T23:14:33Z + 12 + 2024-10-29T00:12:58Z current 2024-09-18T23:10:21Z - 2024-10-21T23:14:33Z + 2024-10-29T00:12:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -108,6 +108,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1575,6 +1590,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3126,6 +3174,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 notsure where SUSE Linux Enterprise Module for Confidential Computing 15 SP6 is contained? no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46727 skipping CVE-2024-46730 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46729 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46728 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46723 skipping CVE-2024-46726 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46725 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46724 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46723.xml 2024-10-16 01:12:09.474589000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46723.xml.new 2024-10-29 01:13:00.617874000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:12:08Z + 12 + 2024-10-29T00:13:00Z current 2024-09-18T23:10:24Z - 2024-10-15T23:12:08Z + 2024-10-29T00:13:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -107,6 +107,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1574,6 +1589,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3118,6 +3166,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46722 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46722.xml 2024-10-16 01:12:10.384547000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46722.xml.new 2024-10-29 01:13:01.438820000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:12:09Z + 12 + 2024-10-29T00:13:00Z current 2024-09-18T23:10:25Z - 2024-10-15T23:12:09Z + 2024-10-29T00:13:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -107,6 +107,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1574,6 +1589,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3118,6 +3166,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46721.xml 2024-10-16 01:12:11.179472000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46721.xml.new 2024-10-29 01:13:02.366877000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:10Z + 11 + 2024-10-29T00:13:01Z current 2024-09-18T23:10:25Z - 2024-10-15T23:12:10Z + 2024-10-29T00:13:01Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -149,6 +149,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1268,6 +1283,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -2524,6 +2572,17 @@ Container bci/bci-sle15-kernel-module-devel:15.5.26.7:kernel-syms-5.14.21-150500.55.83.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46720 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46717 skipping CVE-2024-46719 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46718 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46715 skipping CVE-2024-46716 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46715.xml 2024-10-16 01:12:15.167768000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46715.xml.new 2024-10-29 01:13:04.298176000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:14Z + 11 + 2024-10-29T00:13:03Z current 2024-09-18T23:10:26Z - 2024-10-15T23:12:14Z + 2024-10-29T00:13:03Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -125,6 +125,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1592,6 +1607,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3154,6 +3202,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46714 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46711 skipping CVE-2024-46713 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46712 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46707 skipping CVE-2024-46710 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46709 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46708 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46707.xml 2024-10-16 01:12:19.777502000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46707.xml.new 2024-10-29 01:13:06.200080000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:19Z + 11 + 2024-10-29T00:13:05Z current 2024-09-16T23:10:14Z - 2024-10-15T23:12:19Z + 2024-10-29T00:13:05Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -115,6 +115,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1582,6 +1597,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3134,6 +3182,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46702 skipping CVE-2024-46706 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46705 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46704 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46703 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46702.xml 2024-10-16 01:12:21.765925000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46702.xml.new 2024-10-29 01:13:07.127008000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:21Z + 11 + 2024-10-29T00:13:06Z current 2024-09-16T23:10:16Z - 2024-10-15T23:12:21Z + 2024-10-29T00:13:06Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -118,6 +118,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1582,6 +1597,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3113,6 +3161,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46695 skipping CVE-2024-46701 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46700 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46699 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46698 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46697 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46696 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46686 skipping CVE-2024-46694 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46693 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46692 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46691 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46690 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46689 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46688 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46687 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46686.xml 2024-10-16 01:12:30.614460000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46686.xml.new 2024-10-29 01:13:08.280941000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:30Z + 11 + 2024-10-29T00:13:07Z current 2024-09-13T23:10:02Z - 2024-10-15T23:12:30Z + 2024-10-29T00:13:07Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -108,6 +108,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1575,6 +1590,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3120,6 +3168,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46685 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46685.xml 2024-10-16 01:12:31.342950000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46685.xml.new 2024-10-29 01:13:08.971924000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:30Z + 11 + 2024-10-29T00:13:08Z current 2024-09-13T23:10:02Z - 2024-10-15T23:12:30Z + 2024-10-29T00:13:08Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -111,6 +111,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1578,6 +1593,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3126,6 +3174,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46679 skipping CVE-2024-46684 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46683 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46682 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46681 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46680 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46679.xml 2024-10-16 01:12:34.297837000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46679.xml.new 2024-10-29 01:13:10.056850000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:33Z + 11 + 2024-10-29T00:13:09Z current 2024-09-13T23:10:04Z - 2024-10-15T23:12:33Z + 2024-10-29T00:13:09Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -134,6 +134,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1598,6 +1613,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3145,6 +3193,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46677 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46677.xml 2024-10-16 01:12:35.816789000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46677.xml.new 2024-10-29 01:13:11.598765000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:35Z + 11 + 2024-10-29T00:13:10Z current 2024-09-13T23:10:04Z - 2024-10-15T23:12:35Z + 2024-10-29T00:13:10Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -114,6 +114,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1578,6 +1593,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3105,6 +3153,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46676 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46676.xml 2024-10-16 01:12:36.808638000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46676.xml.new 2024-10-29 01:13:12.604232000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:36Z + 11 + 2024-10-29T00:13:12Z current 2024-09-13T23:10:05Z - 2024-10-15T23:12:36Z + 2024-10-29T00:13:12Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -129,6 +129,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1593,6 +1608,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3135,6 +3183,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46675 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46675.xml 2024-10-16 01:12:37.610689000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46675.xml.new 2024-10-29 01:13:13.459182000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:37Z + 11 + 2024-10-29T00:13:12Z current 2024-09-13T23:10:05Z - 2024-10-15T23:12:37Z + 2024-10-29T00:13:12Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -122,6 +122,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1586,6 +1601,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3121,6 +3169,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-46673 skipping CVE-2024-46674 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46673.xml 2024-10-16 01:12:39.181494000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-46673.xml.new 2024-10-29 01:13:14.326143000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-15T23:12:38Z + 11 + 2024-10-29T00:13:13Z current 2024-09-13T23:10:06Z - 2024-10-15T23:12:38Z + 2024-10-29T00:13:13Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -116,6 +116,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1583,6 +1598,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3136,6 +3184,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-46672 as CVE page is older than CVRF-CVE file. skipping CVE-2024-46478 as CVE page is older than CVRF-CVE file. CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-45817: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45817 CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-45817: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-45817: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-45817: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-45817: no packages for openSUSE Leap Micro 5.5, but entry? skipping CVE-2024-46292 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45993 as CVE page is older than CVRF-CVE file. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. skipping CVE-2024-45770 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45769 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45620 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45619 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45618 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45617 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45616 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45615 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-45508 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-45508 skipping CVE-2024-45614 as CVE page is older than CVRF-CVE file. notsure where SUSE Liberty Linux 9 is contained? notsure where SUSE Liberty Linux 8 is contained? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45492 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45492.xml 2024-10-20 01:11:55.680024000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45492.xml.new 2024-10-29 01:13:24.556095000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-19T23:11:55Z + 30 + 2024-10-29T00:13:23Z current 2024-08-30T23:09:41Z - 2024-10-19T23:11:55Z + 2024-10-29T00:13:23Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -438,6 +438,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1732,6 +1747,24 @@ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-EC2-BYOS + + expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + + expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libexpat1-2.4.4-150400.3.22.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -2473,12 +2506,6 @@ expat as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - libexpat1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libexpat1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - expat as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -2633,6 +2660,12 @@ Image SLES12-SP5-Azure-SAP-BYOS:libexpat1-2.1.0-21.37.1 Image SLES12-SP5-EC2-BYOS:expat-2.1.0-21.37.1 Image SLES12-SP5-EC2-BYOS:libexpat1-2.1.0-21.37.1 + Image SLES12-SP5-GCE-BYOS:expat-2.1.0-21.37.1 + Image SLES12-SP5-GCE-BYOS:libexpat1-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-BYOS:expat-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-BYOS:libexpat1-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-On-Demand:expat-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libexpat1-2.1.0-21.37.1 Image SLES15-SP4-CHOST-BYOS:libexpat1-2.4.4-150400.3.22.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:libexpat1-2.4.4-150400.3.22.1 Image SLES15-SP4-CHOST-BYOS-Azure:libexpat1-2.4.4-150400.3.22.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45491 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45491.xml 2024-10-20 01:11:56.251968000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45491.xml.new 2024-10-29 01:13:25.618048000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-19T23:11:55Z + 30 + 2024-10-29T00:13:24Z current 2024-08-30T23:09:42Z - 2024-10-19T23:11:55Z + 2024-10-29T00:13:24Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -438,6 +438,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1732,6 +1747,24 @@ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-EC2-BYOS + + expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + + expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libexpat1-2.4.4-150400.3.22.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -2473,12 +2506,6 @@ expat as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - libexpat1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libexpat1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - expat as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -2633,6 +2660,12 @@ Image SLES12-SP5-Azure-SAP-BYOS:libexpat1-2.1.0-21.37.1 Image SLES12-SP5-EC2-BYOS:expat-2.1.0-21.37.1 Image SLES12-SP5-EC2-BYOS:libexpat1-2.1.0-21.37.1 + Image SLES12-SP5-GCE-BYOS:expat-2.1.0-21.37.1 + Image SLES12-SP5-GCE-BYOS:libexpat1-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-BYOS:expat-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-BYOS:libexpat1-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-On-Demand:expat-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libexpat1-2.1.0-21.37.1 Image SLES15-SP4-CHOST-BYOS:libexpat1-2.4.4-150400.3.22.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:libexpat1-2.4.4-150400.3.22.1 Image SLES15-SP4-CHOST-BYOS-Azure:libexpat1-2.4.4-150400.3.22.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45490 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45490.xml 2024-10-20 01:11:56.804983000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45490.xml.new 2024-10-29 01:13:26.429993000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-19T23:11:56Z + 30 + 2024-10-29T00:13:25Z current 2024-08-30T23:09:42Z - 2024-10-19T23:11:56Z + 2024-10-29T00:13:25Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -438,6 +438,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1732,6 +1747,24 @@ libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-EC2-BYOS + + expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + + expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + expat-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libexpat1-2.1.0-21.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libexpat1-2.4.4-150400.3.22.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -2473,12 +2506,6 @@ expat as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - libexpat1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libexpat1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - expat as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -2633,6 +2660,12 @@ Image SLES12-SP5-Azure-SAP-BYOS:libexpat1-2.1.0-21.37.1 Image SLES12-SP5-EC2-BYOS:expat-2.1.0-21.37.1 Image SLES12-SP5-EC2-BYOS:libexpat1-2.1.0-21.37.1 + Image SLES12-SP5-GCE-BYOS:expat-2.1.0-21.37.1 + Image SLES12-SP5-GCE-BYOS:libexpat1-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-BYOS:expat-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-BYOS:libexpat1-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-On-Demand:expat-2.1.0-21.37.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libexpat1-2.1.0-21.37.1 Image SLES15-SP4-CHOST-BYOS:libexpat1-2.4.4-150400.3.22.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:libexpat1-2.4.4-150400.3.22.1 Image SLES15-SP4-CHOST-BYOS-Azure:libexpat1-2.4.4-150400.3.22.1 skipping CVE-2024-45405 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-45310 skipping CVE-2024-45306 as CVE page is older than CVRF-CVE file. CVE-2024-45231: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-45231: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-45231: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-45230: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-45230: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-45230: no packages for SUSE Package Hub 15 SP5, but entry? no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-45026 skipping CVE-2024-45030 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45029 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45028 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45027 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-45020 skipping CVE-2024-45025 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45024 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45023 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45022 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45021 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45019 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45018 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45017 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-45013 skipping CVE-2024-45015 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45014 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-45008 skipping CVE-2024-45012 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45011 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45010 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45009 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45008.xml 2024-10-14 01:11:37.531365000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-45008.xml.new 2024-10-29 01:13:34.889061000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-13T23:11:37Z + 11 + 2024-10-29T00:13:34Z current 2024-09-04T23:10:08Z - 2024-10-13T23:11:37Z + 2024-10-29T00:13:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -110,6 +110,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1406,6 +1421,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -2506,6 +2554,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44999 skipping CVE-2024-45007 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45006 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45005 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45004 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45003 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45002 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45001 as CVE page is older than CVRF-CVE file. skipping CVE-2024-45000 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44999.xml 2024-10-16 01:13:02.964771000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44999.xml.new 2024-10-29 01:13:35.706023000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:13:02Z + 12 + 2024-10-29T00:13:35Z current 2024-09-04T23:10:11Z - 2024-10-15T23:13:02Z + 2024-10-29T00:13:35Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -165,6 +165,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1632,6 +1647,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3234,6 +3282,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44998.xml 2024-10-16 01:13:04.015689000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44998.xml.new 2024-10-29 01:13:36.453044000 +0100 @@ -14,13 +14,13 @@ 1 - 13 - 2024-10-15T23:13:03Z + 14 + 2024-10-29T00:13:35Z current 2024-09-04T23:10:11Z - 2024-10-15T23:13:03Z + 2024-10-29T00:13:35Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -104,6 +104,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1542,6 +1557,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3063,6 +3111,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44987 skipping CVE-2024-44997 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44996 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44995 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44994 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44993 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44992 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44991 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44990 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44989 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44988 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44987.xml 2024-10-17 01:11:46.596958000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44987.xml.new 2024-10-29 01:13:37.418118000 +0100 @@ -14,13 +14,13 @@ 1 - 13 - 2024-10-16T23:11:46Z + 14 + 2024-10-29T00:13:36Z current 2024-09-04T23:10:14Z - 2024-10-16T23:11:46Z + 2024-10-29T00:13:36Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -190,6 +190,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1657,6 +1672,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3284,6 +3332,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44982 skipping CVE-2024-44986 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44985 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44984 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44983 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44982.xml 2024-10-16 01:13:15.321592000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44982.xml.new 2024-10-29 01:13:38.358885000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:13:14Z + 12 + 2024-10-29T00:13:37Z current 2024-09-04T23:10:16Z - 2024-10-15T23:13:14Z + 2024-10-29T00:13:37Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -140,6 +140,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1607,6 +1622,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3184,6 +3232,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44972 skipping CVE-2024-44981 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44980 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44979 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44978 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44977 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44976 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44975 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44974 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44973 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44969 skipping CVE-2024-44971 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44970 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44969.xml 2024-10-22 01:16:31.992049000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44969.xml.new 2024-10-29 01:13:39.812811000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-21T23:16:31Z + 12 + 2024-10-29T00:13:39Z current 2024-09-04T23:10:19Z - 2024-10-21T23:16:31Z + 2024-10-29T00:13:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -116,6 +116,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1583,6 +1598,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3142,6 +3190,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44960 skipping CVE-2024-44968 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44967 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44966 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44965 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44964 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44963 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44962 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44961 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44959 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44954 skipping CVE-2024-44957 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44956 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44955 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44954.xml 2024-10-16 01:13:27.167478000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44954.xml.new 2024-10-29 01:13:41.525220000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:13:26Z + 12 + 2024-10-29T00:13:41Z current 2024-09-04T23:10:23Z - 2024-10-15T23:13:26Z + 2024-10-29T00:13:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -113,6 +113,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1580,6 +1595,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3130,6 +3178,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44952 skipping CVE-2024-44953 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44952.xml 2024-10-16 01:13:28.148457000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44952.xml.new 2024-10-29 01:13:42.271340000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:13:27Z + 12 + 2024-10-29T00:13:41Z current 2024-09-04T23:10:25Z - 2024-10-15T23:13:27Z + 2024-10-29T00:13:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -169,6 +169,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1636,6 +1651,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3242,6 +3290,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-44951 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44950.xml 2024-10-16 01:13:29.362924000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44950.xml.new 2024-10-29 01:13:42.951269000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:13:28Z + 12 + 2024-10-29T00:13:42Z current 2024-09-04T23:10:25Z - 2024-10-15T23:13:28Z + 2024-10-29T00:13:42Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -120,6 +120,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1558,6 +1573,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3095,6 +3143,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44948 skipping CVE-2024-44949 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44948.xml 2024-10-16 01:13:30.328832000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44948.xml.new 2024-10-29 01:13:43.606131000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:13:29Z + 12 + 2024-10-29T00:13:43Z current 2024-09-04T23:10:26Z - 2024-10-15T23:13:29Z + 2024-10-29T00:13:43Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -119,6 +119,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1586,6 +1601,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3142,6 +3190,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44947 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-44947 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44947.xml 2024-10-20 01:12:39.435734000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44947.xml.new 2024-10-29 01:13:44.345093000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-19T23:12:38Z + 30 + 2024-10-29T00:13:43Z current 2024-09-02T23:09:53Z - 2024-10-19T23:12:38Z + 2024-10-29T00:13:43Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -158,6 +158,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1943,6 +1958,39 @@ kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -4033,6 +4081,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.133.2 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-44946 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-44946 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44946.xml 2024-10-20 01:12:40.139710000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-44946.xml.new 2024-10-29 01:13:45.130082000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-19T23:12:39Z + 13 + 2024-10-29T00:13:44Z current 2024-08-31T23:09:48Z - 2024-10-19T23:12:39Z + 2024-10-29T00:13:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -225,6 +225,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1933,6 +1948,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3953,6 +4001,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.136.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1 skipping CVE-2024-44945 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44944 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44943 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44942 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44941 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44940 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44939 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44938 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44937 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44936 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44935 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44934 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44933 as CVE page is older than CVRF-CVE file. skipping CVE-2024-44932 as CVE page is older than CVRF-CVE file. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. no cpe found for SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security in CVE-2024-44187 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-44187 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-43914 skipping CVE-2024-44070 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43914.xml 2024-10-16 01:13:41.367797000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43914.xml.new 2024-10-29 01:13:47.625917000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:13:40Z + 12 + 2024-10-29T00:13:47Z current 2024-08-26T23:09:52Z - 2024-10-15T23:13:40Z + 2024-10-29T00:13:47Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -138,6 +138,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1542,6 +1557,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -2925,6 +2973,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-43913 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43912.xml 2024-10-16 01:13:42.714664000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43912.xml.new 2024-10-29 01:13:49.597840000 +0100 @@ -14,13 +14,13 @@ 1 - 18 - 2024-10-15T23:13:42Z + 19 + 2024-10-29T00:13:48Z current 2024-08-27T23:10:04Z - 2024-10-15T23:13:42Z + 2024-10-29T00:13:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -105,6 +105,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1535,6 +1550,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -2946,6 +2994,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.37:kernel-default-6.4.0-150600.23.22.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-43911 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43910 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43909 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43908 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43907.xml 2024-10-22 01:17:05.975765000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43907.xml.new 2024-10-29 01:13:52.143260000 +0100 @@ -14,13 +14,13 @@ 1 - 24 - 2024-10-21T23:17:05Z + 25 + 2024-10-29T00:13:50Z current 2024-08-26T23:09:53Z - 2024-10-21T23:17:05Z + 2024-10-29T00:13:50Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1573,6 +1588,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3021,6 +3069,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43906 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43905.xml 2024-10-22 01:17:08.119144000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43905.xml.new 2024-10-29 01:13:52.854113000 +0100 @@ -14,13 +14,13 @@ 1 - 24 - 2024-10-21T23:17:07Z + 25 + 2024-10-29T00:13:52Z current 2024-08-26T23:09:54Z - 2024-10-21T23:17:07Z + 2024-10-29T00:13:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -108,6 +108,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1572,6 +1587,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3019,6 +3067,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-43904 skipping CVE-2024-43903 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43902.xml 2024-10-22 01:17:10.483012000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43902.xml.new 2024-10-29 01:13:54.387073000 +0100 @@ -14,13 +14,13 @@ 1 - 23 - 2024-10-21T23:17:10Z + 24 + 2024-10-29T00:13:53Z current 2024-08-26T23:09:55Z - 2024-10-21T23:17:10Z + 2024-10-29T00:13:53Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -110,6 +110,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1574,6 +1589,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3023,6 +3071,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43901 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43900.xml 2024-10-16 01:13:48.146940000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43900.xml.new 2024-10-29 01:13:55.390030000 +0100 @@ -14,13 +14,13 @@ 1 - 27 - 2024-10-15T23:13:47Z + 28 + 2024-10-29T00:13:54Z current 2024-08-26T23:09:56Z - 2024-10-15T23:13:47Z + 2024-10-29T00:13:54Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -194,6 +194,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1732,6 +1747,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3460,6 +3508,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43899 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43898.xml 2024-10-22 01:17:13.458916000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43898.xml.new 2024-10-29 01:13:56.402944000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-21T23:17:12Z + 12 + 2024-10-29T00:13:55Z current 2024-08-26T23:09:57Z - 2024-10-21T23:17:12Z + 2024-10-29T00:13:55Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -99,6 +99,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1514,6 +1529,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -2958,6 +3006,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-43897 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43896 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43895 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43894 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43893.xml 2024-10-16 01:13:50.584762000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43893.xml.new 2024-10-29 01:13:57.255874000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-15T23:13:50Z + 27 + 2024-10-29T00:13:56Z current 2024-08-26T23:09:58Z - 2024-10-15T23:13:50Z + 2024-10-29T00:13:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -139,6 +139,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1619,6 +1634,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3121,6 +3169,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43892.xml 2024-10-22 01:17:18.673091000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43892.xml.new 2024-10-29 01:13:58.087938000 +0100 @@ -14,13 +14,13 @@ 1 - 24 - 2024-10-21T23:17:18Z + 25 + 2024-10-29T00:13:57Z current 2024-08-26T23:09:59Z - 2024-10-21T23:17:18Z + 2024-10-29T00:13:57Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -136,6 +136,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1600,6 +1615,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3075,6 +3123,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-43890 skipping CVE-2024-43891 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43890.xml 2024-10-16 01:13:51.798724000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43890.xml.new 2024-10-29 01:13:58.755833000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-15T23:13:51Z + 12 + 2024-10-29T00:13:58Z current 2024-08-26T23:09:59Z - 2024-10-15T23:13:51Z + 2024-10-29T00:13:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -119,6 +119,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1523,6 +1538,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -2887,6 +2935,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-43889 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43888 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43887 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43886 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43885 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43884.xml 2024-10-16 01:13:54.297557000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43884.xml.new 2024-10-29 01:13:59.665800000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-15T23:13:53Z + 27 + 2024-10-29T00:13:59Z current 2024-08-26T23:10:01Z - 2024-10-15T23:13:53Z + 2024-10-29T00:13:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -106,6 +106,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1571,6 +1586,39 @@ kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3046,6 +3094,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.37:kernel-default-6.4.0-150600.23.22.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-43883 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43883.xml 2024-10-20 01:13:02.667053000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43883.xml.new 2024-10-29 01:14:00.524230000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-19T23:13:02Z + 29 + 2024-10-29T00:13:59Z current 2024-08-24T23:09:48Z - 2024-10-19T23:13:02Z + 2024-10-29T00:13:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -150,6 +150,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1976,6 +1991,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -4110,6 +4158,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-43882 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43882.xml 2024-10-20 01:13:04.692889000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43882.xml.new 2024-10-29 01:14:01.581204000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-19T23:13:03Z + 31 + 2024-10-29T00:14:00Z current 2024-08-21T23:10:10Z - 2024-10-19T23:13:03Z + 2024-10-29T00:14:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -189,6 +189,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2020,6 +2035,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -4172,6 +4220,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 skipping CVE-2024-43881 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43880 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43879.xml 2024-10-14 01:12:23.019440000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43879.xml.new 2024-10-29 01:14:02.953087000 +0100 @@ -14,13 +14,13 @@ 1 - 25 - 2024-10-13T23:12:22Z + 26 + 2024-10-29T00:14:02Z current 2024-08-21T23:10:13Z - 2024-10-13T23:12:22Z + 2024-10-29T00:14:02Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -114,6 +114,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1649,6 +1664,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3273,6 +3321,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43878 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43877 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43876 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43875 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43874 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43873 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43872.xml 2024-10-16 01:14:00.961695000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43872.xml.new 2024-10-29 01:14:03.945028000 +0100 @@ -14,13 +14,13 @@ 1 - 27 - 2024-10-15T23:14:00Z + 28 + 2024-10-29T00:14:03Z current 2024-08-21T23:10:21Z - 2024-10-15T23:14:00Z + 2024-10-29T00:14:03Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -113,6 +113,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1651,6 +1666,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3298,6 +3346,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43871.xml 2024-10-16 01:14:01.622682000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43871.xml.new 2024-10-29 01:14:04.559991000 +0100 @@ -14,13 +14,13 @@ 1 - 27 - 2024-10-15T23:14:01Z + 28 + 2024-10-29T00:14:04Z current 2024-08-21T23:10:22Z - 2024-10-15T23:14:01Z + 2024-10-29T00:14:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -114,6 +114,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1717,6 +1732,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3421,6 +3469,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43870 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43869 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43868 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43867 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43866.xml 2024-10-16 01:14:06.740894000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43866.xml.new 2024-10-29 01:14:05.474947000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:14:06Z + 29 + 2024-10-29T00:14:04Z current 2024-08-21T23:10:25Z - 2024-10-15T23:14:06Z + 2024-10-29T00:14:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -112,6 +112,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1642,6 +1657,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3270,6 +3318,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43865 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43864 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43863.xml 2024-10-16 01:14:08.557812000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43863.xml.new 2024-10-29 01:14:06.117918000 +0100 @@ -14,13 +14,13 @@ 1 - 27 - 2024-10-15T23:14:08Z + 28 + 2024-10-29T00:14:05Z current 2024-08-21T23:10:26Z - 2024-10-15T23:14:08Z + 2024-10-29T00:14:05Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -125,6 +125,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1663,6 +1678,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3322,6 +3370,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-43861 skipping CVE-2024-43862 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43861.xml 2024-10-20 01:13:13.563924000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43861.xml.new 2024-10-29 01:14:07.408861000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-19T23:13:13Z + 29 + 2024-10-29T00:14:06Z current 2024-08-20T23:10:15Z - 2024-10-19T23:13:13Z + 2024-10-29T00:14:06Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -143,6 +143,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1916,6 +1931,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3921,6 +3969,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 skipping CVE-2024-43860 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43859 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43858 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43857 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43856.xml 2024-10-16 01:14:12.539592000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43856.xml.new 2024-10-29 01:14:08.120837000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:14:12Z + 29 + 2024-10-29T00:14:07Z current 2024-08-17T23:09:36Z - 2024-10-15T23:14:12Z + 2024-10-29T00:14:07Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -123,6 +123,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1661,6 +1676,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3318,6 +3366,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43855 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43854.xml 2024-10-16 01:14:14.100512000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43854.xml.new 2024-10-29 01:14:09.157864000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:14:13Z + 29 + 2024-10-29T00:14:08Z current 2024-08-17T23:09:36Z - 2024-10-15T23:14:13Z + 2024-10-29T00:14:08Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -113,6 +113,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1643,6 +1658,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3272,6 +3320,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-43853 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43853.xml 2024-10-20 01:13:16.750773000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43853.xml.new 2024-10-29 01:14:10.437188000 +0100 @@ -14,13 +14,13 @@ 1 - 27 - 2024-10-19T23:13:16Z + 28 + 2024-10-29T00:14:09Z current 2024-08-17T23:09:37Z - 2024-10-19T23:13:16Z + 2024-10-29T00:14:09Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -169,6 +169,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1785,6 +1800,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3501,18 +3549,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3625,6 +3661,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 @@ -4150,10 +4197,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source skipping CVE-2024-43852 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43850 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43843 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43842 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43841 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43839.xml 2024-10-16 01:14:20.413768000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43839.xml.new 2024-10-29 01:14:15.909971000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:14:19Z + 30 + 2024-10-29T00:14:14Z current 2024-08-17T23:09:40Z - 2024-10-15T23:14:19Z + 2024-10-29T00:14:14Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -119,6 +119,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1649,6 +1664,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3284,6 +3332,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43838 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43837 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43836 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43835 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43834 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43833 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43832 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43831.xml 2024-10-16 01:14:24.674450000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43831.xml.new 2024-10-29 01:14:16.875881000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-15T23:14:24Z + 31 + 2024-10-29T00:14:16Z current 2024-08-17T23:09:42Z - 2024-10-15T23:14:24Z + 2024-10-29T00:14:16Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1639,6 +1654,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3264,6 +3312,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43830 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43829 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43828 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43827 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43826 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43825 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43824 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43823 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43822 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43821 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43820 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43819.xml 2024-10-16 01:14:29.673709000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-43819.xml.new 2024-10-29 01:14:18.159889000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:14:29Z + 30 + 2024-10-29T00:14:17Z current 2024-08-17T23:09:46Z - 2024-10-15T23:14:29Z + 2024-10-29T00:14:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -118,6 +118,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1656,6 +1671,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3308,6 +3356,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-43818 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43817 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43816 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43815 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43806 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43802 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43790 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43788 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43398 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43374 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43363 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43362 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43357 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43168 as CVE page is older than CVRF-CVE file. skipping CVE-2024-43167 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42934 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42934.xml 2024-10-19 01:14:36.299764000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42934.xml.new 2024-10-29 01:14:24.588950000 +0100 @@ -14,13 +14,13 @@ 1 - 10 - 2024-10-18T23:14:35Z + 11 + 2024-10-29T00:14:23Z current 2024-08-30T07:17:37Z - 2024-10-18T23:14:35Z + 2024-10-29T00:14:23Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -58,6 +58,16 @@ + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + SUSE Liberty Linux 9 @@ -239,6 +249,253 @@ openSUSE Tumbleweed + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + OpenIPMI @@ -311,6 +568,12 @@ libOpenIPMIui1-2.0.36.4+git.c114912-1.1 + + OpenIPMI-2.0.21-10.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + OpenIPMI-2.0.21-10.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + OpenIPMI-2.0.32-5.el9_4 as a component of SUSE Liberty Linux 9 @@ -494,9 +757,6 @@ OpenIPMI as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - OpenIPMI-python as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - OpenIPMI as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -553,6 +813,8 @@ CVE-2024-42934 + Image SLES12-SP5-GCE-SAP-BYOS:OpenIPMI-2.0.21-10.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:OpenIPMI-2.0.21-10.9.1 SUSE Liberty Linux 9:OpenIPMI-2.0.32-5.el9_4 SUSE Liberty Linux 9:OpenIPMI-devel-2.0.32-5.el9_4 SUSE Liberty Linux 9:OpenIPMI-lanserv-2.0.32-5.el9_4 @@ -587,6 +849,229 @@ openSUSE Tumbleweed:libOpenIPMI0-2.0.36.4+git.c114912-1.1 openSUSE Tumbleweed:libOpenIPMIui1-2.0.36.4+git.c114912-1.1 + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + No V5 entry found for CVE-2024-42511 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/42xxxx/CVE-2024-42511.json:No such file or directory skipping CVE-2024-42472 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42415 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42367 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42353 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42322.xml 2024-10-16 01:14:42.493530000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42322.xml.new 2024-10-29 01:14:27.795781000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:14:42Z + 30 + 2024-10-29T00:14:27Z current 2024-08-17T23:09:48Z - 2024-10-15T23:14:42Z + 2024-10-29T00:14:27Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -114,6 +114,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1709,6 +1724,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3395,6 +3443,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42321 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42320 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42319 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42318 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42317 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42315 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42314 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42313 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42312.xml 2024-10-16 01:14:46.956781000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42312.xml.new 2024-10-29 01:14:29.019398000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-15T23:14:46Z + 31 + 2024-10-29T00:14:28Z current 2024-08-17T23:09:50Z - 2024-10-15T23:14:46Z + 2024-10-29T00:14:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -115,6 +115,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1645,6 +1660,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3276,6 +3324,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42311 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42310.xml 2024-10-16 01:14:48.809687000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42310.xml.new 2024-10-29 01:14:30.327187000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:14:48Z + 29 + 2024-10-29T00:14:29Z current 2024-08-17T23:09:51Z - 2024-10-15T23:14:48Z + 2024-10-29T00:14:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -110,6 +110,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1645,6 +1660,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3265,6 +3313,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42309.xml 2024-10-16 01:14:49.734636000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42309.xml.new 2024-10-29 01:14:31.962064000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:14:49Z + 30 + 2024-10-29T00:14:31Z current 2024-08-17T23:09:51Z - 2024-10-15T23:14:49Z + 2024-10-29T00:14:31Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -110,6 +110,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1648,6 +1663,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3292,6 +3340,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42308 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42307 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42306.xml 2024-10-16 01:14:50.999609000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42306.xml.new 2024-10-29 01:14:32.760019000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-15T23:14:50Z + 13 + 2024-10-29T00:14:32Z current 2024-08-17T23:09:52Z - 2024-10-15T23:14:50Z + 2024-10-29T00:14:32Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1542,6 +1557,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3047,6 +3095,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42305.xml 2024-10-16 01:14:51.804577000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42305.xml.new 2024-10-29 01:14:33.447066000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-15T23:14:51Z + 13 + 2024-10-29T00:14:33Z current 2024-08-17T23:09:52Z - 2024-10-15T23:14:51Z + 2024-10-29T00:14:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -152,6 +152,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1585,6 +1600,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3133,6 +3181,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42301 skipping CVE-2024-42304 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42303 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42302 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42301.xml 2024-10-20 01:13:49.323049000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42301.xml.new 2024-10-29 01:14:34.171978000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-19T23:13:48Z + 32 + 2024-10-29T00:14:33Z current 2024-08-17T23:09:53Z - 2024-10-19T23:13:48Z + 2024-10-29T00:14:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -145,6 +145,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1780,6 +1795,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3632,6 +3680,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1 skipping CVE-2024-42300 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42299 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42298 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42297 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42296 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42295 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42294 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42293 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42292 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42291 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42290 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42289.xml 2024-10-22 01:18:59.565795000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42289.xml.new 2024-10-29 01:14:34.914934000 +0100 @@ -14,13 +14,13 @@ 1 - 25 - 2024-10-21T23:18:59Z + 26 + 2024-10-29T00:14:34Z current 2024-08-17T23:09:56Z - 2024-10-21T23:18:59Z + 2024-10-29T00:14:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -148,6 +148,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1612,6 +1627,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3099,6 +3147,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42288.xml 2024-10-22 01:19:00.571763000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42288.xml.new 2024-10-29 01:14:35.822857000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-21T23:18:59Z + 27 + 2024-10-29T00:14:35Z current 2024-08-17T23:09:57Z - 2024-10-21T23:18:59Z + 2024-10-29T00:14:35Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -108,6 +108,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1572,6 +1587,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3007,6 +3055,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42287.xml 2024-10-22 01:19:01.520711000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42287.xml.new 2024-10-29 01:14:36.578096000 +0100 @@ -14,13 +14,13 @@ 1 - 25 - 2024-10-21T23:19:00Z + 26 + 2024-10-29T00:14:36Z current 2024-08-17T23:09:57Z - 2024-10-21T23:19:00Z + 2024-10-29T00:14:36Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -147,6 +147,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1614,6 +1629,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3112,6 +3160,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42286.xml 2024-10-22 01:19:02.398161000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42286.xml.new 2024-10-29 01:14:37.301779000 +0100 @@ -14,13 +14,13 @@ 1 - 25 - 2024-10-21T23:19:01Z + 26 + 2024-10-29T00:14:36Z current 2024-08-17T23:09:57Z - 2024-10-21T23:19:01Z + 2024-10-29T00:14:36Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -133,6 +133,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1597,6 +1612,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3069,6 +3117,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42285.xml 2024-10-16 01:15:01.763497000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42285.xml.new 2024-10-29 01:14:38.045761000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:15:01Z + 29 + 2024-10-29T00:14:37Z current 2024-08-17T23:09:57Z - 2024-10-15T23:15:01Z + 2024-10-29T00:14:37Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -117,6 +117,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1655,6 +1670,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3306,6 +3354,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42284.xml 2024-10-18 01:13:48.829631000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42284.xml.new 2024-10-29 01:14:38.715312000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-17T23:13:48Z + 31 + 2024-10-29T00:14:38Z current 2024-08-17T23:09:58Z - 2024-10-17T23:13:48Z + 2024-10-29T00:14:38Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -115,6 +115,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1737,6 +1752,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3451,6 +3499,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42283 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42282 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42281.xml 2024-10-16 01:15:04.962847000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42281.xml.new 2024-10-29 01:14:40.224156000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:15:04Z + 30 + 2024-10-29T00:14:39Z current 2024-08-17T23:09:58Z - 2024-10-15T23:15:04Z + 2024-10-29T00:14:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1639,6 +1654,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3264,6 +3312,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42280.xml 2024-10-16 01:15:05.787815000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42280.xml.new 2024-10-29 01:14:40.963213000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:15:05Z + 29 + 2024-10-29T00:14:40Z current 2024-08-17T23:09:59Z - 2024-10-15T23:15:05Z + 2024-10-29T00:14:40Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -108,6 +108,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1646,6 +1661,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3288,6 +3336,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42271 skipping CVE-2024-42279 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42278 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42277 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42276 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42275 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42274 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42273 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42272 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42271.xml 2024-10-20 01:14:01.405933000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42271.xml.new 2024-10-29 01:14:41.891119000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-19T23:14:00Z + 30 + 2024-10-29T00:14:41Z current 2024-08-17T23:10:01Z - 2024-10-19T23:14:00Z + 2024-10-29T00:14:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -178,6 +178,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1978,6 +1993,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -4111,6 +4159,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 skipping CVE-2024-42270 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42269 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42267 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42266 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42265.xml 2024-10-22 01:19:18.402821000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42265.xml.new 2024-10-29 01:14:43.574967000 +0100 @@ -14,13 +14,13 @@ 1 - 13 - 2024-10-21T23:19:17Z + 14 + 2024-10-29T00:14:42Z current 2024-08-17T23:10:02Z - 2024-10-21T23:19:17Z + 2024-10-29T00:14:42Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -113,6 +113,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1593,6 +1608,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3107,6 +3155,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-42264 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42263 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42262 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42261 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42260 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42259.xml 2024-10-16 01:15:15.742807000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42259.xml.new 2024-10-29 01:14:44.206917000 +0100 @@ -14,13 +14,13 @@ 1 - 22 - 2024-10-15T23:15:15Z + 23 + 2024-10-29T00:14:43Z current 2024-08-14T23:09:48Z - 2024-10-15T23:15:15Z + 2024-10-29T00:14:43Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -121,6 +121,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1624,6 +1639,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3216,6 +3264,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-42258 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42257 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42256 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42255 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42254 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42252 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42251 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42250 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42249 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42248 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42247 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42246.xml 2024-10-16 01:15:22.910905000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42246.xml.new 2024-10-29 01:14:45.188892000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-15T23:15:22Z + 32 + 2024-10-29T00:14:44Z current 2024-08-07T23:10:15Z - 2024-10-15T23:15:22Z + 2024-10-29T00:14:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -130,6 +130,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1817,6 +1832,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3602,6 +3650,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42245 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42244.xml 2024-10-16 01:15:24.564849000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42244.xml.new 2024-10-29 01:14:45.876863000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:15:24Z + 29 + 2024-10-29T00:14:45Z current 2024-08-07T23:10:15Z - 2024-10-15T23:15:24Z + 2024-10-29T00:14:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -124,6 +124,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1662,6 +1677,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3320,6 +3368,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42243 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42242 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42241 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42240.xml 2024-10-22 01:19:37.181857000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42240.xml.new 2024-10-29 01:14:46.470826000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-21T23:19:36Z + 27 + 2024-10-29T00:14:46Z current 2024-08-07T23:10:16Z - 2024-10-21T23:19:36Z + 2024-10-29T00:14:46Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -159,6 +159,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1739,6 +1754,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3443,6 +3491,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42239 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42238 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42237 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42236.xml 2024-10-16 01:15:31.340465000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42236.xml.new 2024-10-29 01:14:47.147777000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:15:30Z + 29 + 2024-10-29T00:14:46Z current 2024-08-07T23:10:18Z - 2024-10-15T23:15:30Z + 2024-10-29T00:14:46Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -114,6 +114,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1652,6 +1667,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3300,6 +3348,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42232 skipping CVE-2024-42235 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42234 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42233 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42232.xml 2024-10-20 01:14:14.946720000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42232.xml.new 2024-10-29 01:14:47.910234000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-19T23:14:14Z + 29 + 2024-10-29T00:14:47Z current 2024-08-07T23:10:19Z - 2024-10-19T23:14:14Z + 2024-10-29T00:14:47Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -164,6 +164,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2000,6 +2015,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -4139,6 +4187,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 skipping CVE-2024-42231 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42230 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42229 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42228.xml 2024-10-16 01:15:35.571719000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42228.xml.new 2024-10-29 01:14:48.606195000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:15:34Z + 29 + 2024-10-29T00:14:48Z current 2024-08-05T23:09:42Z - 2024-10-15T23:15:34Z + 2024-10-29T00:14:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -114,6 +114,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1727,6 +1742,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3467,6 +3515,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42227 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42226.xml 2024-10-16 01:15:36.816658000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42226.xml.new 2024-10-29 01:14:49.405190000 +0100 @@ -14,13 +14,13 @@ 1 - 22 - 2024-10-15T23:15:36Z + 23 + 2024-10-29T00:14:48Z current 2024-08-05T23:09:42Z - 2024-10-15T23:15:36Z + 2024-10-29T00:14:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -81,6 +81,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP6-CHOST-BYOS @@ -1299,6 +1314,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-6.4.0-150600.23.22.1 as a component of Image SLES15-SP6-CHOST-BYOS @@ -2580,6 +2628,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP6-CHOST-BYOS:kernel-default-6.4.0-150600.23.22.1 Image SLES15-SP6-CHOST-BYOS-Aliyun:kernel-default-6.4.0-150600.23.22.1 Image SLES15-SP6-CHOST-BYOS-Azure:kernel-default-6.4.0-150600.23.22.1 skipping CVE-2024-42225 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42224.xml 2024-10-16 01:15:37.482634000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42224.xml.new 2024-10-29 01:14:50.208114000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-15T23:15:37Z + 37 + 2024-10-29T00:14:49Z current 2024-08-05T23:09:43Z - 2024-10-15T23:15:37Z + 2024-10-29T00:14:49Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -130,6 +130,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1861,6 +1876,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3766,6 +3814,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42223.xml 2024-10-22 01:19:49.161699000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42223.xml.new 2024-10-29 01:14:51.359081000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-21T23:19:48Z + 32 + 2024-10-29T00:14:50Z current 2024-08-05T23:09:43Z - 2024-10-21T23:19:48Z + 2024-10-29T00:14:50Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -121,6 +121,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1632,6 +1647,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3165,6 +3213,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42162.xml 2024-10-16 01:15:38.146624000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42162.xml.new 2024-10-29 01:14:52.073043000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:15:37Z + 30 + 2024-10-29T00:14:51Z current 2024-08-05T23:09:44Z - 2024-10-15T23:15:37Z + 2024-10-29T00:14:51Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -110,6 +110,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1650,6 +1665,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3312,6 +3360,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42161 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42160 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42159 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42158.xml 2024-10-16 01:15:40.969462000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42158.xml.new 2024-10-29 01:14:52.857981000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:15:40Z + 30 + 2024-10-29T00:14:52Z current 2024-08-05T23:09:45Z - 2024-10-15T23:15:40Z + 2024-10-29T00:14:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -113,6 +113,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1653,6 +1668,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3318,6 +3366,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42157.xml 2024-10-16 01:15:41.777411000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42157.xml.new 2024-10-29 01:14:53.594959000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:15:41Z + 30 + 2024-10-29T00:14:53Z current 2024-08-05T23:09:45Z - 2024-10-15T23:15:41Z + 2024-10-29T00:14:53Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -108,6 +108,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1648,6 +1663,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3308,6 +3356,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42156 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42155.xml 2024-10-16 01:15:43.516803000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42155.xml.new 2024-10-29 01:14:54.344960000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:15:43Z + 30 + 2024-10-29T00:14:53Z current 2024-08-05T23:09:46Z - 2024-10-15T23:15:43Z + 2024-10-29T00:14:53Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -111,6 +111,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1651,6 +1666,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3314,6 +3362,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-42154 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42154.xml 2024-10-16 01:15:44.337771000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42154.xml.new 2024-10-29 01:14:55.006885000 +0100 @@ -14,13 +14,13 @@ 1 - 13 - 2024-10-15T23:15:43Z + 14 + 2024-10-29T00:14:54Z current 2024-08-05T23:09:46Z - 2024-10-15T23:15:43Z + 2024-10-29T00:14:54Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -114,6 +114,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1651,6 +1666,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3273,6 +3321,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-42153 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42152 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42151 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42150 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42149 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42148.xml 2024-10-16 01:15:47.236639000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42148.xml.new 2024-10-29 01:14:55.800903000 +0100 @@ -14,13 +14,13 @@ 1 - 32 - 2024-10-15T23:15:46Z + 33 + 2024-10-29T00:14:55Z current 2024-08-05T23:09:48Z - 2024-10-15T23:15:46Z + 2024-10-29T00:14:55Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -187,6 +187,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1790,6 +1805,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3570,6 +3618,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42145 skipping CVE-2024-42147 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42146 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42145.xml 2024-10-20 01:14:25.271675000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42145.xml.new 2024-10-29 01:14:56.638824000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-19T23:14:24Z + 41 + 2024-10-29T00:14:56Z current 2024-08-05T23:09:49Z - 2024-10-19T23:14:24Z + 2024-10-29T00:14:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -171,6 +171,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2414,6 +2429,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4975,6 +5023,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-42144 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42142 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42141 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42140 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42139 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42138 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42137 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42136 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42135 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42134 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42133.xml 2024-10-22 01:20:11.116055000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42133.xml.new 2024-10-29 01:14:57.799236000 +0100 @@ -14,13 +14,13 @@ 1 - 14 - 2024-10-21T23:20:10Z + 15 + 2024-10-29T00:14:57Z current 2024-08-05T23:09:52Z - 2024-10-21T23:20:10Z + 2024-10-29T00:14:57Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -915,9 +915,21 @@ kernel-livepatch-6_4_0-150600_10_8-rt-1-150600.1.3.2 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + + + kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 + kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3 + + kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 + + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + kernel-macros @@ -1557,6 +1569,18 @@ reiserfs-kmp-rt-6.4.0-150600.10.8.3 as a component of openSUSE Leap 15.6 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -2307,6 +2331,12 @@ openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.22.1 openSUSE Leap 15.6:reiserfs-kmp-rt-6.4.0-150600.10.8.3 + + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel skipping CVE-2024-42132 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42131 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42130 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42129 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42128 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42127 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42126 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42125 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42124.xml 2024-10-16 01:15:59.535550000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42124.xml.new 2024-10-29 01:14:58.541185000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-15T23:15:58Z + 39 + 2024-10-29T00:14:58Z current 2024-08-05T23:09:54Z - 2024-10-15T23:15:58Z + 2024-10-29T00:14:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -126,6 +126,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1943,6 +1958,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3915,6 +3963,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-42123 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42122 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42121 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42120.xml 2024-10-16 01:16:02.300866000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42120.xml.new 2024-10-29 01:14:59.310129000 +0100 @@ -14,13 +14,13 @@ 1 - 34 - 2024-10-15T23:16:01Z + 35 + 2024-10-29T00:14:58Z current 2024-08-05T23:09:55Z - 2024-10-15T23:16:01Z + 2024-10-29T00:14:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -121,6 +121,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1706,6 +1721,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3434,6 +3482,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42119.xml 2024-10-22 01:20:22.681944000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42119.xml.new 2024-10-29 01:15:00.426139000 +0100 @@ -14,13 +14,13 @@ 1 - 33 - 2024-10-21T23:20:22Z + 34 + 2024-10-29T00:14:59Z current 2024-08-05T23:09:55Z - 2024-10-21T23:20:22Z + 2024-10-29T00:14:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -125,6 +125,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1636,6 +1651,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3161,6 +3209,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-42118 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42117 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42116 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42115 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42114 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42113 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42112 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42111 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42110.xml 2024-10-16 01:16:07.370590000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42110.xml.new 2024-10-29 01:15:01.254028000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-15T23:16:06Z + 32 + 2024-10-29T00:15:00Z current 2024-08-05T23:09:58Z - 2024-10-15T23:16:06Z + 2024-10-29T00:15:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -148,6 +148,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1801,6 +1816,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3603,6 +3651,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42109 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42108 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42107 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42106.xml 2024-10-16 01:16:09.845437000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42106.xml.new 2024-10-29 01:15:01.968021000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:16:09Z + 30 + 2024-10-29T00:15:01Z current 2024-08-05T23:09:59Z - 2024-10-15T23:16:09Z + 2024-10-29T00:15:01Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -180,6 +180,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1720,6 +1735,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3452,6 +3500,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42105 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42104 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42103 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42101.xml 2024-10-16 01:16:11.643851000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42101.xml.new 2024-10-29 01:15:02.853963000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:16:11Z + 29 + 2024-10-29T00:15:02Z current 2024-08-05T23:10:00Z - 2024-10-15T23:16:11Z + 2024-10-29T00:15:02Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -110,6 +110,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1658,6 +1673,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3338,6 +3386,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42100 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42099 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42098 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42097 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42096.xml 2024-10-16 01:16:14.528715000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42096.xml.new 2024-10-29 01:15:03.626905000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-15T23:16:14Z + 41 + 2024-10-29T00:15:03Z current 2024-08-05T23:10:01Z - 2024-10-15T23:16:14Z + 2024-10-29T00:15:03Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -168,6 +168,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2077,6 +2092,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4174,6 +4222,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42093 skipping CVE-2024-42095 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42094 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42093.xml 2024-10-20 01:14:44.977649000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42093.xml.new 2024-10-29 01:15:04.625884000 +0100 @@ -14,13 +14,13 @@ 1 - 41 - 2024-10-19T23:14:44Z + 42 + 2024-10-29T00:15:03Z current 2024-08-05T23:10:02Z - 2024-10-19T23:14:44Z + 2024-10-29T00:15:03Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -144,6 +144,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2137,6 +2152,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4375,18 +4423,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4466,6 +4502,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 @@ -5169,10 +5216,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source skipping CVE-2024-42092 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42091 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42090.xml 2024-10-16 01:16:17.610582000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42090.xml.new 2024-10-29 01:15:05.438860000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-15T23:16:17Z + 31 + 2024-10-29T00:15:04Z current 2024-08-05T23:10:03Z - 2024-10-15T23:16:17Z + 2024-10-29T00:15:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -122,6 +122,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1756,6 +1771,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3519,6 +3567,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-42089 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42088 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42087 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42086 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42085 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42084 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42083 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42082.xml 2024-10-16 01:16:20.621871000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42082.xml.new 2024-10-29 01:15:06.339845000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-15T23:16:20Z + 31 + 2024-10-29T00:15:05Z current 2024-08-05T23:10:05Z - 2024-10-15T23:16:20Z + 2024-10-29T00:15:05Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -147,6 +147,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1779,6 +1794,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3561,6 +3609,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-42077 skipping CVE-2024-42081 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42080 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42079 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42078 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42077.xml 2024-10-20 01:14:51.303822000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42077.xml.new 2024-10-29 01:15:07.456241000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-19T23:14:50Z + 27 + 2024-10-29T00:15:06Z current 2024-08-05T23:10:06Z - 2024-10-19T23:14:50Z + 2024-10-29T00:15:06Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -189,6 +189,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1967,6 +1982,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -4022,18 +4070,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4132,6 +4168,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 skipping CVE-2024-42076 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42075 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42074 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42073 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42072 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42071 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42070.xml 2024-10-16 01:16:25.954611000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-42070.xml.new 2024-10-29 01:15:08.204178000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-15T23:16:25Z + 37 + 2024-10-29T00:15:07Z current 2024-08-05T23:10:07Z - 2024-10-15T23:16:25Z + 2024-10-29T00:15:07Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -122,6 +122,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1874,6 +1889,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3786,6 +3834,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-42069 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42068 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42067 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42066 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42065 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42064 as CVE page is older than CVRF-CVE file. skipping CVE-2024-42063 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-42010 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-42010 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-42009 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-42009 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-42008 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-42008 CVE-2024-42005: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-42005: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-42005: no packages for SUSE Package Hub 15 SP5, but entry? notsure where SUSE Linux Enterprise Module for Certifications 15 SP5 is contained? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41996 CVE-2024-41991: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-41991: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-41991: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-41990: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-41990: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-41990: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-41989: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-41989: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-41989: no packages for SUSE Package Hub 15 SP5, but entry? skipping CVE-2024-41965 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41957 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41946 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41817 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41810 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41671 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41110 skipping CVE-2024-41123 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41098.xml 2024-10-22 01:21:26.502123000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41098.xml.new 2024-10-29 01:15:15.480787000 +0100 @@ -14,13 +14,13 @@ 1 - 27 - 2024-10-21T23:21:25Z + 28 + 2024-10-29T00:15:14Z current 2024-08-05T23:10:13Z - 2024-10-21T23:21:25Z + 2024-10-29T00:15:14Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -145,6 +145,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1619,6 +1634,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3139,6 +3187,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41097.xml 2024-10-16 01:16:35.952604000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41097.xml.new 2024-10-29 01:15:16.363772000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:16:35Z + 29 + 2024-10-29T00:15:15Z current 2024-08-05T23:10:13Z - 2024-10-15T23:16:35Z + 2024-10-29T00:15:15Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -149,6 +149,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1762,6 +1777,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3537,6 +3585,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-41096 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41095.xml 2024-10-22 01:21:28.670991000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41095.xml.new 2024-10-29 01:15:17.291214000 +0100 @@ -14,13 +14,13 @@ 1 - 33 - 2024-10-21T23:21:28Z + 34 + 2024-10-29T00:15:16Z current 2024-08-05T23:10:14Z - 2024-10-21T23:21:28Z + 2024-10-29T00:15:16Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -120,6 +120,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1631,6 +1646,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3163,6 +3211,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-41094 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41093 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41092 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41091.xml 2024-10-22 01:21:32.208843000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41091.xml.new 2024-10-29 01:15:18.069211000 +0100 @@ -14,13 +14,13 @@ 1 - 41 - 2024-10-21T23:21:31Z + 42 + 2024-10-29T00:15:17Z current 2024-07-25T23:10:24Z - 2024-10-21T23:21:31Z + 2024-10-29T00:15:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -187,6 +187,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2253,6 +2268,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4411,6 +4459,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41090 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41090.xml 2024-10-20 01:15:07.592958000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41090.xml.new 2024-10-29 01:15:18.819181000 +0100 @@ -14,13 +14,13 @@ 1 - 45 - 2024-10-19T23:15:07Z + 46 + 2024-10-29T00:15:18Z current 2024-07-25T23:10:24Z - 2024-10-19T23:15:07Z + 2024-10-29T00:15:18Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -221,6 +221,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2849,6 +2864,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -5840,18 +5888,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -5912,6 +5948,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41089.xml 2024-10-22 01:21:33.125761000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41089.xml.new 2024-10-29 01:15:19.510191000 +0100 @@ -14,13 +14,13 @@ 1 - 34 - 2024-10-21T23:21:32Z + 35 + 2024-10-29T00:15:19Z current 2024-08-05T23:10:15Z - 2024-10-21T23:21:32Z + 2024-10-29T00:15:19Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -121,6 +121,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1685,6 +1700,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3371,6 +3419,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41087 skipping CVE-2024-41088 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41087.xml 2024-10-20 01:15:08.968875000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41087.xml.new 2024-10-29 01:15:20.316032000 +0100 @@ -14,13 +14,13 @@ 1 - 41 - 2024-10-19T23:15:08Z + 42 + 2024-10-29T00:15:19Z current 2024-08-01T23:09:51Z - 2024-10-19T23:15:08Z + 2024-10-29T00:15:19Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -199,6 +199,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2176,6 +2191,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -4449,6 +4497,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1 skipping CVE-2024-41086 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41085 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41084 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41083 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41082.xml 2024-10-22 01:21:38.181059000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41082.xml.new 2024-10-29 01:15:21.138022000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-21T23:21:37Z + 12 + 2024-10-29T00:15:20Z current 2024-08-05T23:10:17Z - 2024-10-21T23:21:37Z + 2024-10-29T00:15:20Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -93,6 +93,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1222,6 +1237,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -2452,6 +2500,17 @@ Container bci/bci-sle15-kernel-module-devel:15.5.26.7:kernel-syms-5.14.21-150500.55.83.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41081.xml 2024-10-16 01:16:42.836696000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41081.xml.new 2024-10-29 01:15:22.307942000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-15T23:16:42Z + 37 + 2024-10-29T00:15:21Z current 2024-08-05T23:10:17Z - 2024-10-15T23:16:42Z + 2024-10-29T00:15:21Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -128,6 +128,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1859,6 +1874,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3762,6 +3810,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-41080 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41079.xml 2024-10-22 01:21:40.818854000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41079.xml.new 2024-10-29 01:15:23.150901000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-21T23:21:40Z + 31 + 2024-10-29T00:15:22Z current 2024-08-05T23:10:18Z - 2024-10-21T23:21:40Z + 2024-10-29T00:15:22Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1634,6 +1649,39 @@ kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3307,6 +3355,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.37:kernel-default-6.4.0-150600.23.22.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41078.xml 2024-10-16 01:16:45.468549000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41078.xml.new 2024-10-29 01:15:24.147887000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-15T23:16:44Z + 37 + 2024-10-29T00:15:23Z current 2024-08-05T23:10:18Z - 2024-10-15T23:16:44Z + 2024-10-29T00:15:23Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -129,6 +129,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1820,6 +1835,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3568,6 +3616,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-41077 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41075 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41074 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41073.xml 2024-10-16 01:16:49.000877000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41073.xml.new 2024-10-29 01:15:25.631755000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:16:48Z + 30 + 2024-10-29T00:15:25Z current 2024-08-05T23:10:19Z - 2024-10-15T23:16:48Z + 2024-10-29T00:15:25Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1726,6 +1741,39 @@ kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3476,6 +3524,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.37:kernel-default-6.4.0-150600.23.22.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41072.xml 2024-10-22 01:21:47.441000000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41072.xml.new 2024-10-29 01:15:26.313236000 +0100 @@ -14,13 +14,13 @@ 1 - 34 - 2024-10-21T23:21:46Z + 35 + 2024-10-29T00:15:25Z current 2024-08-05T23:10:19Z - 2024-10-21T23:21:46Z + 2024-10-29T00:15:25Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -120,6 +120,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1806,6 +1821,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3539,6 +3587,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 notsure where SUSE Liberty Linux 7 LTSS is contained? no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-41071 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41071.xml 2024-10-22 01:21:48.521012000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41071.xml.new 2024-10-29 01:15:27.206177000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-21T23:21:47Z + 39 + 2024-10-29T00:15:26Z current 2024-08-05T23:10:19Z - 2024-10-21T23:21:47Z + 2024-10-29T00:15:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -148,6 +148,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2035,6 +2050,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3970,6 +4018,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41070.xml 2024-10-16 01:16:49.729872000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41070.xml.new 2024-10-29 01:15:28.105175000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-15T23:16:49Z + 38 + 2024-10-29T00:15:27Z current 2024-08-05T23:10:20Z - 2024-10-15T23:16:49Z + 2024-10-29T00:15:27Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -173,6 +173,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1904,6 +1919,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3852,6 +3900,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-41069 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41068.xml 2024-10-16 01:16:50.918779000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41068.xml.new 2024-10-29 01:15:28.723103000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-15T23:16:50Z + 31 + 2024-10-29T00:15:28Z current 2024-08-05T23:10:20Z - 2024-10-15T23:16:50Z + 2024-10-29T00:15:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -131,6 +131,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1671,6 +1686,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3354,6 +3402,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-41067 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41066.xml 2024-10-16 01:16:52.095759000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41066.xml.new 2024-10-29 01:15:29.537092000 +0100 @@ -14,13 +14,13 @@ 1 - 35 - 2024-10-15T23:16:51Z + 36 + 2024-10-29T00:15:29Z current 2024-08-05T23:10:21Z - 2024-10-15T23:16:51Z + 2024-10-29T00:15:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -137,6 +137,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1828,6 +1843,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3584,6 +3632,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-41065 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41064.xml 2024-10-16 01:16:53.999641000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41064.xml.new 2024-10-29 01:15:30.231020000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-15T23:16:53Z + 41 + 2024-10-29T00:15:29Z current 2024-08-05T23:10:21Z - 2024-10-15T23:16:53Z + 2024-10-29T00:15:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -124,6 +124,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1859,6 +1874,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3643,6 +3691,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41063.xml 2024-10-22 01:21:52.965744000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41063.xml.new 2024-10-29 01:15:31.017980000 +0100 @@ -14,13 +14,13 @@ 1 - 32 - 2024-10-21T23:21:52Z + 33 + 2024-10-29T00:15:30Z current 2024-08-05T23:10:21Z - 2024-10-21T23:21:52Z + 2024-10-29T00:15:30Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -133,6 +133,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1819,6 +1834,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3565,6 +3613,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41062 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41062.xml 2024-10-20 01:15:19.429853000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41062.xml.new 2024-10-29 01:15:32.091037000 +0100 @@ -14,13 +14,13 @@ 1 - 32 - 2024-10-19T23:15:19Z + 33 + 2024-10-29T00:15:31Z current 2024-08-05T23:10:22Z - 2024-10-19T23:15:19Z + 2024-10-29T00:15:31Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -173,6 +173,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1970,6 +1985,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -4095,6 +4143,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 skipping CVE-2024-41061 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41060.xml 2024-10-22 01:21:54.490155000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41060.xml.new 2024-10-29 01:15:32.883874000 +0100 @@ -14,13 +14,13 @@ 1 - 32 - 2024-10-21T23:21:54Z + 33 + 2024-10-29T00:15:32Z current 2024-08-05T23:10:22Z - 2024-10-21T23:21:54Z + 2024-10-29T00:15:32Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -123,6 +123,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1699,6 +1714,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3290,6 +3338,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41059 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41059.xml 2024-10-20 01:15:20.983776000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41059.xml.new 2024-10-29 01:15:33.885842000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-19T23:15:20Z + 43 + 2024-10-29T00:15:33Z current 2024-08-05T23:10:22Z - 2024-10-19T23:15:20Z + 2024-10-29T00:15:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -358,6 +358,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2175,24 +2190,42 @@ kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-2-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1 @@ -2220,27 +2253,48 @@ kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_61-rt-2-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1 @@ -2259,24 +2313,42 @@ kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 @@ -2301,18 +2373,33 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_197-default-2-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1 @@ -2337,18 +2424,33 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_167-default-2-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1 @@ -2637,12 +2739,21 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-3-8.6.1 + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 + kgraft-patch-4_12_14-122_222-default-2-8.6.1 @@ -2811,6 +2922,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -5481,6 +5625,102 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -5592,18 +5832,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -5673,6 +5901,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 @@ -6564,6 +6803,40 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base skipping CVE-2024-41058 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41057 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41056 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41055 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41054 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41053 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41052 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41051 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41050 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41049 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41048.xml 2024-10-16 01:17:01.696738000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41048.xml.new 2024-10-29 01:15:34.590798000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-15T23:17:01Z + 38 + 2024-10-29T00:15:34Z current 2024-08-05T23:10:25Z - 2024-10-15T23:17:01Z + 2024-10-29T00:15:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -184,6 +184,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1915,6 +1930,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3874,6 +3922,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-41047 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41046 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41045 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41044.xml 2024-10-16 01:17:03.653624000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41044.xml.new 2024-10-29 01:15:35.337777000 +0100 @@ -14,13 +14,13 @@ 1 - 39 - 2024-10-15T23:17:03Z + 40 + 2024-10-29T00:15:34Z current 2024-08-05T23:10:26Z - 2024-10-15T23:17:03Z + 2024-10-29T00:15:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -129,6 +129,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2038,6 +2053,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4096,6 +4144,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-41043 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41042 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41041 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41040 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41039 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41038 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41037 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41036 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41035.xml 2024-10-16 01:17:06.668448000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41035.xml.new 2024-10-29 01:15:36.140202000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-15T23:17:06Z + 29 + 2024-10-29T00:15:35Z current 2024-08-05T23:10:28Z - 2024-10-15T23:17:06Z + 2024-10-29T00:15:35Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -126,6 +126,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1739,6 +1754,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3491,6 +3539,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-41034 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41033 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41032 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41031 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41030 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41029 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41028 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41027 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41026 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41025 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41024 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41023 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41022 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41021 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41020.xml 2024-10-16 01:17:12.788630000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41020.xml.new 2024-10-29 01:15:36.994159000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:17:12Z + 30 + 2024-10-29T00:15:36Z current 2024-08-05T23:10:32Z - 2024-10-15T23:17:12Z + 2024-10-29T00:15:36Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -115,6 +115,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1655,6 +1670,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3322,6 +3370,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-41019 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41018 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41017 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41016.xml 2024-10-17 01:13:54.711723000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41016.xml.new 2024-10-29 01:15:37.728163000 +0100 @@ -14,13 +14,13 @@ 1 - 43 - 2024-10-16T23:13:54Z + 44 + 2024-10-29T00:15:37Z current 2024-08-05T23:10:33Z - 2024-10-16T23:13:54Z + 2024-10-29T00:15:37Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -145,6 +145,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1936,6 +1951,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3856,6 +3904,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41015.xml 2024-10-16 01:17:15.700502000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41015.xml.new 2024-10-29 01:15:38.432119000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-15T23:17:15Z + 37 + 2024-10-29T00:15:38Z current 2024-08-05T23:10:33Z - 2024-10-15T23:17:15Z + 2024-10-29T00:15:38Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -119,6 +119,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1871,6 +1886,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3780,6 +3828,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41014.xml 2024-10-22 01:22:26.361962000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41014.xml.new 2024-10-29 01:15:39.162067000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-21T23:22:25Z + 41 + 2024-10-29T00:15:38Z current 2024-07-31T23:09:57Z - 2024-10-21T23:22:25Z + 2024-10-29T00:15:38Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -190,6 +190,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2185,6 +2200,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4274,6 +4322,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-41012 skipping CVE-2024-41013 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41012.xml 2024-10-20 01:15:38.414854000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-41012.xml.new 2024-10-29 01:15:39.996056000 +0100 @@ -14,13 +14,13 @@ 1 - 43 - 2024-10-19T23:15:37Z + 44 + 2024-10-29T00:15:39Z current 2024-07-25T10:03:16Z - 2024-10-19T23:15:37Z + 2024-10-29T00:15:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -144,6 +144,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -2186,6 +2201,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -4531,6 +4579,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1 skipping CVE-2024-41011 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41010 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41009 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41008 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41007 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41006 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41005 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41004 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41003 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41002 as CVE page is older than CVRF-CVE file. skipping CVE-2024-41001 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40999.xml 2024-10-16 01:17:26.314451000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40999.xml.new 2024-10-29 01:15:41.942933000 +0100 @@ -14,13 +14,13 @@ 1 - 44 - 2024-10-15T23:17:25Z + 45 + 2024-10-29T00:15:41Z current 2024-07-16T23:10:06Z - 2024-10-15T23:17:25Z + 2024-10-29T00:15:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -171,6 +171,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2178,6 +2193,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4387,6 +4435,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40998.xml 2024-10-16 01:17:27.053887000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40998.xml.new 2024-10-29 01:15:42.664870000 +0100 @@ -14,13 +14,13 @@ 1 - 47 - 2024-10-15T23:17:26Z + 48 + 2024-10-29T00:15:42Z current 2024-07-15T23:09:46Z - 2024-10-15T23:17:26Z + 2024-10-29T00:15:42Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -229,6 +229,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2274,6 +2289,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4558,6 +4606,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40997 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40996 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40995.xml 2024-10-16 01:17:28.071858000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40995.xml.new 2024-10-29 01:15:43.448854000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-15T23:17:27Z + 39 + 2024-10-29T00:15:42Z current 2024-07-15T23:09:47Z - 2024-10-15T23:17:27Z + 2024-10-29T00:15:42Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -151,6 +151,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1772,6 +1787,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3553,6 +3601,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40994 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40993 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40992 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40991 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40990.xml 2024-10-22 01:22:40.980720000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40990.xml.new 2024-10-29 01:15:44.538816000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-21T23:22:40Z + 37 + 2024-10-29T00:15:43Z current 2024-07-15T23:09:48Z - 2024-10-21T23:22:40Z + 2024-10-29T00:15:43Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -120,6 +120,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1795,6 +1810,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3510,6 +3558,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40989 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40988.xml 2024-10-16 01:17:31.090683000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40988.xml.new 2024-10-29 01:15:45.324247000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-15T23:17:30Z + 38 + 2024-10-29T00:15:44Z current 2024-07-16T23:10:09Z - 2024-10-15T23:17:30Z + 2024-10-29T00:15:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -122,6 +122,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1944,6 +1959,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3933,6 +3981,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40987.xml 2024-10-16 01:17:31.845634000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40987.xml.new 2024-10-29 01:15:46.021193000 +0100 @@ -14,13 +14,13 @@ 1 - 39 - 2024-10-15T23:17:31Z + 40 + 2024-10-29T00:15:45Z current 2024-07-25T10:03:19Z - 2024-10-15T23:17:31Z + 2024-10-29T00:15:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -118,6 +118,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1870,6 +1885,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3778,6 +3826,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40986 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40985 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40984.xml 2024-10-16 01:17:33.375571000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40984.xml.new 2024-10-29 01:15:46.738157000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-15T23:17:32Z + 37 + 2024-10-29T00:15:46Z current 2024-07-15T23:09:49Z - 2024-10-15T23:17:32Z + 2024-10-29T00:15:46Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -128,6 +128,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1943,6 +1958,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.63.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3925,6 +3973,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.63.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.63.1 Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.73.1 skipping CVE-2024-40983 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40982.xml 2024-10-16 01:17:34.835474000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40982.xml.new 2024-10-29 01:15:47.469118000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-15T23:17:34Z + 38 + 2024-10-29T00:15:47Z current 2024-07-15T23:09:50Z - 2024-10-15T23:17:34Z + 2024-10-29T00:15:47Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -126,6 +126,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1886,6 +1901,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3820,6 +3868,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40981 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40980 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40978.xml 2024-10-16 01:17:37.064839000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40978.xml.new 2024-10-29 01:15:48.821063000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-15T23:17:36Z + 39 + 2024-10-29T00:15:48Z current 2024-07-16T23:10:11Z - 2024-10-15T23:17:36Z + 2024-10-29T00:15:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -169,6 +169,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1882,6 +1897,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3768,6 +3816,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-40973 skipping CVE-2024-40976 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40975 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40974 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40972 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40971 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40970 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40969 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40968 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40967.xml 2024-10-16 01:17:41.900600000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40967.xml.new 2024-10-29 01:15:50.214993000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-15T23:17:41Z + 39 + 2024-10-29T00:15:49Z current 2024-07-16T23:10:15Z - 2024-10-15T23:17:41Z + 2024-10-29T00:15:49Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -122,6 +122,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1861,6 +1876,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3776,6 +3824,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40966.xml 2024-10-16 01:17:42.694584000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40966.xml.new 2024-10-29 01:15:50.952956000 +0100 @@ -14,13 +14,13 @@ 1 - 45 - 2024-10-15T23:17:42Z + 46 + 2024-10-29T00:15:50Z current 2024-07-16T23:10:16Z - 2024-10-15T23:17:42Z + 2024-10-29T00:15:50Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -178,6 +178,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2185,6 +2200,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4401,6 +4449,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-40965 skipping CVE-2024-40964 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40963 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40962 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40961 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40960 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40959.xml 2024-10-18 01:15:35.298556000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40959.xml.new 2024-10-29 01:15:52.706839000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-17T23:15:34Z + 43 + 2024-10-29T00:15:52Z current 2024-07-16T23:10:17Z - 2024-10-17T23:15:34Z + 2024-10-29T00:15:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -169,6 +169,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2072,6 +2087,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4146,6 +4194,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40954 skipping CVE-2024-40958 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40957 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40956 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40955 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40954.xml 2024-10-20 01:16:02.532101000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40954.xml.new 2024-10-29 01:15:53.620913000 +0100 @@ -14,13 +14,13 @@ 1 - 48 - 2024-10-19T23:16:02Z + 49 + 2024-10-29T00:15:52Z current 2024-07-15T23:09:53Z - 2024-10-19T23:16:02Z + 2024-10-29T00:15:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1983,24 +1983,42 @@ kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-2-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1 @@ -2028,27 +2046,48 @@ kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_61-rt-2-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1 @@ -2067,48 +2106,81 @@ kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 kernel-livepatch-6_4_0-150600_10_5-rt-3-150600.1.8.1 + + kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 + kernel-livepatch-6_4_0-150600_10_8-rt-1-150600.1.3.2 kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_14-default-3-150600.13.6.1 + + kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 + kernel-livepatch-6_4_0-150600_23_17-default-3-150600.13.6.1 + + kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 + kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3 kernel-livepatch-6_4_0-150600_23_7-default-3-150600.13.6.1 + + kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 + kernel-livepatch-6_4_0-150600_8-rt-4-150600.3.1 @@ -4524,6 +4596,78 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -4854,24 +4998,9 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -5699,6 +5828,32 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel @@ -5810,11 +5965,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40953.xml 2024-10-16 01:17:52.964505000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40953.xml.new 2024-10-29 01:15:54.466784000 +0100 @@ -14,13 +14,13 @@ 1 - 45 - 2024-10-15T23:17:52Z + 46 + 2024-10-29T00:15:53Z current 2024-07-15T23:09:53Z - 2024-10-15T23:17:52Z + 2024-10-29T00:15:53Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -217,6 +217,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2224,6 +2239,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4479,6 +4527,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40952 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40951 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40950 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40949 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40948 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40947 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40945 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40944 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40943.xml 2024-10-22 01:23:11.723173000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40943.xml.new 2024-10-29 01:15:55.391232000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-21T23:23:11Z + 38 + 2024-10-29T00:15:54Z current 2024-07-15T23:09:55Z - 2024-10-21T23:23:11Z + 2024-10-29T00:15:54Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -170,6 +170,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1856,6 +1871,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3639,6 +3687,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40942.xml 2024-10-16 01:18:00.008677000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40942.xml.new 2024-10-29 01:15:56.183220000 +0100 @@ -14,13 +14,13 @@ 1 - 39 - 2024-10-15T23:17:59Z + 40 + 2024-10-29T00:15:55Z current 2024-07-15T23:09:55Z - 2024-10-15T23:17:59Z + 2024-10-29T00:15:55Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -167,6 +167,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1919,6 +1934,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3876,6 +3924,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40941.xml 2024-10-16 01:18:00.985582000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40941.xml.new 2024-10-29 01:15:57.962085000 +0100 @@ -14,13 +14,13 @@ 1 - 43 - 2024-10-15T23:18:00Z + 44 + 2024-10-29T00:15:56Z current 2024-07-15T23:09:56Z - 2024-10-15T23:18:00Z + 2024-10-29T00:15:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -127,6 +127,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2015,6 +2030,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4060,6 +4108,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40937 skipping CVE-2024-40940 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40939 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40938 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40937.xml 2024-10-20 01:16:09.296725000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40937.xml.new 2024-10-29 01:15:58.876019000 +0100 @@ -14,13 +14,13 @@ 1 - 44 - 2024-10-19T23:16:08Z + 45 + 2024-10-29T00:15:58Z current 2024-07-15T23:09:56Z - 2024-10-19T23:16:08Z + 2024-10-29T00:15:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -207,6 +207,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2675,6 +2690,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -5560,6 +5608,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40936 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40935 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40934 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40933 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40932.xml 2024-10-22 01:23:18.931715000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40932.xml.new 2024-10-29 01:15:59.707017000 +0100 @@ -14,13 +14,13 @@ 1 - 35 - 2024-10-21T23:23:18Z + 36 + 2024-10-29T00:15:59Z current 2024-07-15T23:09:58Z - 2024-10-21T23:23:18Z + 2024-10-29T00:15:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -118,6 +118,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1804,6 +1819,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3535,6 +3583,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40931 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40930 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40929.xml 2024-10-16 01:18:09.492672000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40929.xml.new 2024-10-29 01:16:00.480963000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-15T23:18:08Z + 43 + 2024-10-29T00:15:59Z current 2024-07-15T23:09:59Z - 2024-10-15T23:18:08Z + 2024-10-29T00:15:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -124,6 +124,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2012,6 +2027,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4054,6 +4102,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40928 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40927 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40926 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40925 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40924 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40923.xml 2024-10-16 01:18:14.101419000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40923.xml.new 2024-10-29 01:16:01.486881000 +0100 @@ -14,13 +14,13 @@ 1 - 44 - 2024-10-15T23:18:13Z + 45 + 2024-10-29T00:16:01Z current 2024-07-15T23:10:00Z - 2024-10-15T23:18:13Z + 2024-10-29T00:16:01Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -237,6 +237,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2226,6 +2241,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4489,6 +4537,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40922 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40921 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40920 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40919 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40918 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40917 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40916 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40915 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40914 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40913 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40912.xml 2024-10-16 01:18:19.514637000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40912.xml.new 2024-10-29 01:16:02.256868000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-15T23:18:19Z + 43 + 2024-10-29T00:16:01Z current 2024-07-15T23:10:03Z - 2024-10-15T23:18:19Z + 2024-10-29T00:16:01Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -186,6 +186,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2095,6 +2110,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4214,6 +4262,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40911 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40910 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40909.xml 2024-10-22 01:23:35.888832000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40909.xml.new 2024-10-29 01:16:02.995805000 +0100 @@ -14,13 +14,13 @@ 1 - 43 - 2024-10-21T23:23:35Z + 44 + 2024-10-29T00:16:02Z current 2024-07-15T23:10:04Z - 2024-10-21T23:23:35Z + 2024-10-29T00:16:02Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1508,30 +1508,48 @@ kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_61-rt-2-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1 kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 kernel-livepatch-6_4_0-150600_10_5-rt-3-150600.1.8.1 + + kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 + kernel-livepatch-6_4_0-150600_10_8-rt-1-150600.1.3.2 kernel-livepatch-6_4_0-150600_23_14-default-3-150600.13.6.1 + + kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 + kernel-livepatch-6_4_0-150600_23_17-default-3-150600.13.6.1 + + kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 + kernel-livepatch-6_4_0-150600_23_22-default-1-150600.13.3.3 @@ -3053,6 +3071,24 @@ klp-build-0~20240812.ad9f0e0-1.1 as a component of openSUSE Tumbleweed + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -4047,6 +4083,14 @@ openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1 openSUSE Tumbleweed:klp-build-0~20240812.ad9f0e0-1.1 + + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel skipping CVE-2024-40908 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40907 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40906 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40905 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40904.xml 2024-10-17 01:14:37.499505000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40904.xml.new 2024-10-29 01:16:03.927766000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-16T23:14:37Z + 39 + 2024-10-29T00:16:03Z current 2024-07-15T23:10:05Z - 2024-10-16T23:14:37Z + 2024-10-29T00:16:03Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -155,6 +155,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1959,6 +1974,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3963,6 +4011,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-40903 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40902 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40901.xml 2024-10-16 01:18:24.614865000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-40901.xml.new 2024-10-29 01:16:04.624286000 +0100 @@ -14,13 +14,13 @@ 1 - 45 - 2024-10-15T23:18:24Z + 46 + 2024-10-29T00:16:04Z current 2024-07-15T23:10:05Z - 2024-10-15T23:18:24Z + 2024-10-29T00:16:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -187,6 +187,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2259,6 +2274,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4540,6 +4588,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 No V5 entry found for CVE-2024-40896 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/40xxxx/CVE-2024-40896.json:No such file or directory skipping CVE-2024-40900 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40899 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40898 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40897 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40780 skipping CVE-2024-40866 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40857 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40794 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40789 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40785 as CVE page is older than CVRF-CVE file. skipping CVE-2024-40782 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40776 skipping CVE-2024-40779 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-40724 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-40724 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-40724 skipping CVE-2024-40725 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-40647 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-40647 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-39929 skipping CVE-2024-39936 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39908 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-39844 skipping CVE-2024-39894 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39884 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-39705 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-39705 skipping CVE-2024-39695 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39689 as CVE page is older than CVRF-CVE file. CVE-2024-39614: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-39614: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-39614: no packages for SUSE Package Hub 15 SP5, but entry? skipping CVE-2024-39573 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39510 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39509.xml 2024-10-16 01:18:36.286747000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39509.xml.new 2024-10-29 01:16:11.489854000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-15T23:18:35Z + 38 + 2024-10-29T00:16:11Z current 2024-07-12T23:09:53Z - 2024-10-15T23:18:35Z + 2024-10-29T00:16:11Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -149,6 +149,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1888,6 +1903,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3830,6 +3878,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-39508 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39507.xml 2024-10-16 01:18:37.551694000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39507.xml.new 2024-10-29 01:16:12.182853000 +0100 @@ -14,13 +14,13 @@ 1 - 44 - 2024-10-15T23:18:37Z + 45 + 2024-10-29T00:16:11Z current 2024-07-12T23:09:54Z - 2024-10-15T23:18:37Z + 2024-10-29T00:16:11Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -174,6 +174,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2160,6 +2175,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4357,6 +4405,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39506.xml 2024-10-16 01:18:38.282650000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39506.xml.new 2024-10-29 01:16:12.921845000 +0100 @@ -14,13 +14,13 @@ 1 - 41 - 2024-10-15T23:18:37Z + 42 + 2024-10-29T00:16:12Z current 2024-07-12T23:09:54Z - 2024-10-15T23:18:37Z + 2024-10-29T00:16:12Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -144,6 +144,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1940,6 +1955,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3915,6 +3963,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-39505 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39504 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39503 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39502 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39501.xml 2024-10-16 01:18:41.135508000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39501.xml.new 2024-10-29 01:16:13.924244000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-15T23:18:40Z + 38 + 2024-10-29T00:16:13Z current 2024-07-15T23:10:10Z - 2024-10-15T23:18:40Z + 2024-10-29T00:16:13Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -189,6 +189,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2014,6 +2029,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4067,6 +4115,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-39500 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39499.xml 2024-10-16 01:18:42.076424000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39499.xml.new 2024-10-29 01:16:14.652236000 +0100 @@ -14,13 +14,13 @@ 1 - 39 - 2024-10-15T23:18:41Z + 40 + 2024-10-29T00:16:14Z current 2024-07-12T23:09:55Z - 2024-10-15T23:18:41Z + 2024-10-29T00:16:14Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -132,6 +132,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1957,6 +1972,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3953,6 +4001,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-39494 skipping CVE-2024-39498 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39497 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39496 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39495 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39494.xml 2024-10-20 01:16:44.114915000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39494.xml.new 2024-10-29 01:16:15.326228000 +0100 @@ -14,13 +14,13 @@ 1 - 45 - 2024-10-19T23:16:43Z + 46 + 2024-10-29T00:16:14Z current 2024-07-12T23:09:56Z - 2024-10-19T23:16:43Z + 2024-10-29T00:16:14Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -207,6 +207,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2696,6 +2711,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -5596,6 +5644,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-39493 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39492 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39491 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39490.xml 2024-10-16 01:18:46.269738000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39490.xml.new 2024-10-29 01:16:15.904167000 +0100 @@ -14,13 +14,13 @@ 1 - 44 - 2024-10-15T23:18:45Z + 45 + 2024-10-29T00:16:15Z current 2024-07-10T23:09:52Z - 2024-10-15T23:18:45Z + 2024-10-29T00:16:15Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -184,6 +184,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2164,6 +2179,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4347,6 +4395,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39489.xml 2024-10-17 01:14:55.458536000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39489.xml.new 2024-10-29 01:16:16.913171000 +0100 @@ -14,13 +14,13 @@ 1 - 33 - 2024-10-16T23:14:55Z + 34 + 2024-10-29T00:16:16Z current 2024-07-10T23:09:53Z - 2024-10-16T23:14:55Z + 2024-10-29T00:16:16Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -112,6 +112,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1646,6 +1661,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3286,6 +3334,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39488.xml 2024-10-22 01:24:15.669764000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39488.xml.new 2024-10-29 01:16:17.743064000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-21T23:24:15Z + 38 + 2024-10-29T00:16:17Z current 2024-07-10T23:09:54Z - 2024-10-21T23:24:15Z + 2024-10-29T00:16:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -231,6 +231,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1967,6 +1982,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3973,6 +4021,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39487.xml 2024-10-16 01:18:48.096630000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-39487.xml.new 2024-10-29 01:16:18.558981000 +0100 @@ -14,13 +14,13 @@ 1 - 44 - 2024-10-15T23:18:47Z + 45 + 2024-10-29T00:16:18Z current 2024-07-09T23:10:02Z - 2024-10-15T23:18:47Z + 2024-10-29T00:16:18Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -204,6 +204,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2368,6 +2383,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4757,6 +4805,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-39486 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39485 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39484 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39483 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39481 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39480 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39479 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39478 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39477 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39475 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39474 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39473 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39472 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39471 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39470 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39469 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39468 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39467 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39466 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39465 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39464 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39463 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39462 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39461 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39371 as CVE page is older than CVRF-CVE file. CVE-2024-39330: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-39330: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-39330: no packages for SUSE Package Hub 15 SP5, but entry? skipping CVE-2024-39338 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39331 as CVE page is older than CVRF-CVE file. CVE-2024-39329: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-39329: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-39329: no packages for SUSE Package Hub 15 SP5, but entry? no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-39312 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-39312 skipping CVE-2024-39298 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39296 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39293 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39292 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39291 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39277 as CVE page is older than CVRF-CVE file. skipping CVE-2024-39276 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-39134 CVE-2024-38875: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-38875: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2024-38875: no packages for SUSE Package Hub 15 SP5, but entry? skipping CVE-2024-38999 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38998 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38796 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38667 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38664 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38663 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38662.xml 2024-10-22 01:25:05.890112000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38662.xml.new 2024-10-29 01:16:26.992042000 +0100 @@ -14,13 +14,13 @@ 1 - 35 - 2024-10-21T23:25:05Z + 36 + 2024-10-29T00:16:26Z current 2024-06-29T17:04:46Z - 2024-10-21T23:25:05Z + 2024-10-29T00:16:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -117,6 +117,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1692,6 +1707,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3457,6 +3505,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-38661 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-38632 skipping CVE-2024-38637 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38636 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38635 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38634 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38633 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38632.xml 2024-10-22 01:25:15.561114000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38632.xml.new 2024-10-29 01:16:28.067043000 +0100 @@ -14,13 +14,13 @@ 1 - 11 - 2024-10-21T23:25:14Z + 12 + 2024-10-29T00:16:27Z current 2024-06-29T17:04:48Z - 2024-10-21T23:25:14Z + 2024-10-29T00:16:27Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -107,6 +107,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1545,6 +1560,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3026,6 +3074,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-38631 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38630.xml 2024-10-16 01:19:17.309587000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38630.xml.new 2024-10-29 01:16:28.704955000 +0100 @@ -14,13 +14,13 @@ 1 - 53 - 2024-10-15T23:19:16Z + 54 + 2024-10-29T00:16:28Z current 2024-06-29T17:04:48Z - 2024-10-15T23:19:16Z + 2024-10-29T00:16:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -176,6 +176,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2183,6 +2198,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4418,6 +4466,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-38629 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38628 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38626 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38625 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38624 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38623 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38622 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38621 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38620 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38618.xml 2024-10-22 01:25:30.752805000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38618.xml.new 2024-10-29 01:16:32.296799000 +0100 @@ -14,13 +14,13 @@ 1 - 55 - 2024-10-21T23:25:30Z + 56 + 2024-10-29T00:16:31Z current 2024-06-21T23:09:37Z - 2024-10-21T23:25:30Z + 2024-10-29T00:16:31Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2313,41 +2313,41 @@ ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4537,18 +4537,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.222.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.222.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.222.1 skipping CVE-2024-38617 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38616 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38615 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38614 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38613 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38612 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38611 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38610 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38609 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38608 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38607 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38606 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38605 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38604 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38603 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38602 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38601 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38600 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38596.xml 2024-10-17 01:15:26.424933000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38596.xml.new 2024-10-29 01:16:34.583211000 +0100 @@ -14,13 +14,13 @@ 1 - 16 - 2024-10-16T23:15:26Z + 17 + 2024-10-29T00:16:34Z current 2024-06-29T17:04:58Z - 2024-10-16T23:15:26Z + 2024-10-29T00:16:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -141,6 +141,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -1649,6 +1664,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150500.55.83.1 as a component of Image SLES15-SP5-CHOST-BYOS-Aliyun @@ -3282,6 +3330,17 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-Azure:kernel-default-5.14.21-150500.55.83.1 Image SLES15-SP5-CHOST-BYOS-EC2:kernel-default-5.14.21-150500.55.83.1 skipping CVE-2024-38595 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38594 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38593 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38592 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38591 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38590 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38589 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38588 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38587 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38586 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38585 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38584 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38583 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38582 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38581 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-38578 skipping CVE-2024-38579 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-38560 skipping CVE-2024-38577 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38576 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38575 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38574 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38573 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38572 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38571 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38570 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38569 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38568 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38567 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38566 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38565 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38564 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38563 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38562 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38561 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38560.xml 2024-10-16 01:19:52.356755000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38560.xml.new 2024-10-29 01:16:36.457084000 +0100 @@ -14,13 +14,13 @@ 1 - 55 - 2024-10-15T23:19:51Z + 56 + 2024-10-29T00:16:35Z current 2024-06-21T23:09:58Z - 2024-10-15T23:19:51Z + 2024-10-29T00:16:35Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -203,6 +203,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2854,6 +2869,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -5820,6 +5868,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-38559 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38558.xml 2024-10-16 01:19:54.029656000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38558.xml.new 2024-10-29 01:16:37.218118000 +0100 @@ -14,13 +14,13 @@ 1 - 47 - 2024-10-15T23:19:53Z + 48 + 2024-10-29T00:16:36Z current 2024-06-21T23:09:59Z - 2024-10-15T23:19:53Z + 2024-10-29T00:16:36Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -210,6 +210,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2353,6 +2368,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4729,6 +4777,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-38557 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38556 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38555 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38554 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38552 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38551 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38550 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38548 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38547 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-38545 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-38538 skipping CVE-2024-38544 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38543 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38542 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38541 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38540 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38539 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-38528 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-38528 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-38519 skipping CVE-2024-38526 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-38448 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-38448 skipping CVE-2024-38477 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38476 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38475 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38474 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38473 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38472 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38445 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-38428 skipping CVE-2024-38394 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38391 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38390 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38388 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38385 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38384 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38381.xml 2024-10-22 01:27:18.198707000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-38381.xml.new 2024-10-29 01:16:43.669207000 +0100 @@ -14,13 +14,13 @@ 1 - 48 - 2024-10-21T23:27:17Z + 49 + 2024-10-29T00:16:42Z current 2024-06-29T17:05:08Z - 2024-10-21T23:27:17Z + 2024-10-29T00:16:42Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -158,6 +158,21 @@ Image SLE-Micro-GCE + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -2087,6 +2102,39 @@ kernel-default-6.4.0-18.1 as a component of Image SLE-Micro-GCE + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.60.1 as a component of Image SLES15-SP5-Azure-Basic @@ -4219,6 +4267,17 @@ Image SLE-Micro-BYOS-GCE:kernel-default-6.4.0-18.1 Image SLE-Micro-EC2:kernel-default-6.4.0-18.1 Image SLE-Micro-GCE:kernel-default-6.4.0-18.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.60.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.60.1 Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.73.1 skipping CVE-2024-38355 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38306 as CVE page is older than CVRF-CVE file. skipping CVE-2024-38286 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-37894 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-37891 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-37891.xml 2024-10-20 01:18:01.706840000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-37891.xml.new 2024-10-29 01:16:46.086063000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-19T23:18:01Z + 39 + 2024-10-29T00:16:45Z current 2024-06-18T23:09:36Z - 2024-10-19T23:18:01Z + 2024-10-29T00:16:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -132,6 +132,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1423,6 +1438,11 @@ SUSE Manager Proxy 4.3 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP4 @@ -1439,6 +1459,21 @@ SUSE Manager Server 4.3 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + openSUSE Leap 15.5 @@ -2060,6 +2095,12 @@ venv-salt-minion + + venv-salt-minion-3006.0-150000.3.67.1 + + + venv-salt-minion-3006.0-3.65.1 + python3-urllib3-1.25.10-150300.4.12.1 as a component of Container bci/kiwi:9.24.43-8.6 @@ -2111,6 +2152,24 @@ python3-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-EC2-BYOS + + python-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python3-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + python-urllib3-1.25.10-3.40.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3320,6 +3379,18 @@ python312-urllib3-2.1.0-3.1 as a component of openSUSE Tumbleweed + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3 + + + venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15 + python3-urllib3 as a component of SUSE Enterprise Storage 7.1 @@ -3419,9 +3490,6 @@ python-urllib3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - python3-urllib3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - python2-urllib3 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -3507,6 +3575,12 @@ Image SLES12-SP5-Azure-SAP-BYOS:python3-urllib3-1.25.10-3.40.1 Image SLES12-SP5-EC2-BYOS:python-urllib3-1.25.10-3.40.1 Image SLES12-SP5-EC2-BYOS:python3-urllib3-1.25.10-3.40.1 + Image SLES12-SP5-GCE-BYOS:python-urllib3-1.25.10-3.40.1 + Image SLES12-SP5-GCE-BYOS:python3-urllib3-1.25.10-3.40.1 + Image SLES12-SP5-GCE-SAP-BYOS:python-urllib3-1.25.10-3.40.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-urllib3-1.25.10-3.40.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python-urllib3-1.25.10-3.40.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-urllib3-1.25.10-3.40.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:python-urllib3-1.25.10-3.40.1 Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:python-urllib3-1.25.10-3.40.1 Image SLES15-SP3-BYOS-Azure:python3-urllib3-1.25.10-150300.4.12.1 @@ -3911,6 +3985,12 @@ openSUSE Tumbleweed:python311-urllib3-2.1.0-3.1 openSUSE Tumbleweed:python312-urllib3-2.1.0-3.1 + + SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1 + SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 skipping CVE-2024-37535 as CVE page is older than CVRF-CVE file. skipping CVE-2024-37407 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-37372 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/37xxxx/CVE-2024-37372.json:No such file or directory no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-37371 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-37371 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-37370 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-37370 skipping CVE-2024-37356 as CVE page is older than CVRF-CVE file. skipping CVE-2024-37353 as CVE page is older than CVRF-CVE file. skipping CVE-2024-37078 as CVE page is older than CVRF-CVE file. skipping CVE-2024-37026 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36964 skipping CVE-2024-36979 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36978 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36977 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36976 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36975 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36974 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36973 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36972 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36971 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36970 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36969 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36968 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36967 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36966 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36965 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36964.xml 2024-10-18 01:17:45.260741000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36964.xml.new 2024-10-29 01:16:59.752856000 +0100 @@ -14,13 +14,13 @@ 1 - 63 - 2024-10-17T23:17:44Z + 64 + 2024-10-29T00:16:59Z current 2024-06-03T23:09:15Z - 2024-10-17T23:17:44Z + 2024-10-29T00:16:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2684,21 +2684,36 @@ kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1 @@ -2726,21 +2741,36 @@ kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1 @@ -2759,21 +2789,36 @@ kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 @@ -2798,15 +2843,27 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1 @@ -2831,15 +2888,27 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1 @@ -2849,6 +2918,9 @@ kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2 @@ -3170,12 +3242,21 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-3-8.6.1 + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 + kgraft-patch-4_12_14-122_222-default-1-8.3.1 @@ -6572,6 +6653,87 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -7839,6 +8001,35 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel skipping CVE-2024-36963 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36962 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36961 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36959 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36958 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36957 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36956 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36955 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36954 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36953 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36952.xml 2024-10-16 01:20:50.864721000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36952.xml.new 2024-10-29 01:17:01.188804000 +0100 @@ -14,13 +14,13 @@ 1 - 58 - 2024-10-15T23:20:50Z + 59 + 2024-10-29T00:17:00Z current 2024-06-04T23:09:34Z - 2024-10-15T23:20:50Z + 2024-10-29T00:17:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2365,41 +2365,41 @@ ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4735,18 +4735,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-36951 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36948 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36947 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36946 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36945 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36944 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36943 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36942 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36940 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36939.xml 2024-10-22 01:28:05.364838000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36939.xml.new 2024-10-29 01:17:04.641092000 +0100 @@ -14,13 +14,13 @@ 1 - 34 - 2024-10-21T23:28:04Z + 35 + 2024-10-29T00:17:03Z current 2024-06-03T23:09:26Z - 2024-10-21T23:28:04Z + 2024-10-29T00:17:03Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -185,6 +185,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1986,6 +2001,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4005,6 +4053,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-36937 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36936 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36935 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36933 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36932 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36931 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36930 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36929 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36928 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36927 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36926 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36925 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36924.xml 2024-10-16 01:21:10.663653000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36924.xml.new 2024-10-29 01:17:06.588036000 +0100 @@ -14,13 +14,13 @@ 1 - 53 - 2024-10-15T23:21:10Z + 54 + 2024-10-29T00:17:06Z current 2024-06-03T23:09:30Z - 2024-10-15T23:21:10Z + 2024-10-29T00:17:06Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -172,6 +172,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2284,6 +2299,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4633,6 +4681,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-36922 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36921 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36920 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36919.xml 2024-10-16 01:21:14.446482000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36919.xml.new 2024-10-29 01:17:08.254916000 +0100 @@ -14,13 +14,13 @@ 1 - 59 - 2024-10-15T23:21:13Z + 60 + 2024-10-29T00:17:07Z current 2024-05-31T23:09:38Z - 2024-10-15T23:21:13Z + 2024-10-29T00:17:07Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2463,41 +2463,41 @@ ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4890,18 +4890,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-36918 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36916 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36915 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36914 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36913 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36912 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36911 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36910 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36909 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36908 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36907 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36906 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36905 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36904 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36903 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36902.xml 2024-10-16 01:21:30.481629000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36902.xml.new 2024-10-29 01:17:09.517855000 +0100 @@ -14,13 +14,13 @@ 1 - 47 - 2024-10-15T23:21:29Z + 48 + 2024-10-29T00:17:08Z current 2024-05-31T23:09:45Z - 2024-10-15T23:21:29Z + 2024-10-29T00:17:08Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -220,6 +220,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2302,6 +2317,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4652,6 +4700,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36901.xml 2024-10-16 01:21:31.579553000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36901.xml.new 2024-10-29 01:17:10.240798000 +0100 @@ -14,13 +14,13 @@ 1 - 47 - 2024-10-15T23:21:30Z + 48 + 2024-10-29T00:17:09Z current 2024-05-31T23:09:46Z - 2024-10-15T23:21:30Z + 2024-10-29T00:17:09Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -217,6 +217,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2299,6 +2314,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4646,6 +4694,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36899 skipping CVE-2024-36900 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36899.xml 2024-10-22 01:28:34.493707000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36899.xml.new 2024-10-29 01:17:11.134834000 +0100 @@ -14,13 +14,13 @@ 1 - 57 - 2024-10-21T23:28:34Z + 58 + 2024-10-29T00:17:10Z current 2024-05-31T23:09:46Z - 2024-10-21T23:28:34Z + 2024-10-29T00:17:10Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2294,21 +2294,36 @@ kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1 @@ -2336,24 +2351,42 @@ kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1 @@ -2372,24 +2405,42 @@ kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 @@ -2399,12 +2450,18 @@ kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2 kernel-livepatch-6_4_0-150600_23_7-default-3-150600.13.6.1 + + kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 + kernel-livepatch-6_4_0-150600_8-rt-4-150600.3.1 @@ -5150,6 +5207,63 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -6418,6 +6532,27 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36894 skipping CVE-2024-36898 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36897 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36896 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36895 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36893 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36892 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36891 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36890 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36889 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36888 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36887 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36886 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36885 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36884 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36883 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36882 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36881 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-36592 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/36xxxx/CVE-2024-36592.json:No such file or directory skipping CVE-2024-36600 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36592.xml 2024-09-21 01:18:23.318408000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36592.xml.new 2024-10-29 01:17:14.481075000 +0100 @@ -14,13 +14,13 @@ 1 - 16 - 2024-09-20T23:18:23Z + 17 + 2024-10-29T00:17:14Z current 2024-07-08T23:12:46Z - 2024-09-20T23:18:23Z + 2024-10-29T00:17:14Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -84,6 +84,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -519,6 +534,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -717,6 +765,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-Standard-On-Demand:kernel-azure-4.12.14-16.191.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-36489 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36484 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36481 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36478 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36477 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36474 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36472 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36462 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36461 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36460 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36387 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36288.xml 2024-10-22 01:29:05.421069000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36288.xml.new 2024-10-29 01:17:16.934970000 +0100 @@ -14,13 +14,13 @@ 1 - 32 - 2024-10-21T23:29:04Z + 33 + 2024-10-29T00:17:16Z current 2024-06-29T17:06:18Z - 2024-10-21T23:29:04Z + 2024-10-29T00:17:16Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -121,6 +121,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1826,6 +1841,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3674,6 +3722,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36286.xml 2024-10-16 01:21:55.276796000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36286.xml.new 2024-10-29 01:17:17.749884000 +0100 @@ -14,13 +14,13 @@ 1 - 33 - 2024-10-15T23:21:54Z + 34 + 2024-10-29T00:17:17Z current 2024-06-21T23:10:50Z - 2024-10-15T23:21:54Z + 2024-10-29T00:17:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -148,6 +148,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1753,6 +1768,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3513,6 +3561,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-36281 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36270.xml 2024-10-16 01:21:56.482757000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36270.xml.new 2024-10-29 01:17:18.493989000 +0100 @@ -14,13 +14,13 @@ 1 - 32 - 2024-10-15T23:21:56Z + 33 + 2024-10-29T00:17:18Z current 2024-06-21T23:10:50Z - 2024-10-15T23:21:56Z + 2024-10-29T00:17:18Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -117,6 +117,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1814,6 +1829,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3630,6 +3678,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-36138 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-36048 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-36041 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-36041 skipping CVE-2024-36033 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36032 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36031 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36030 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36028 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36027 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36026 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36024 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36023 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36022 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36021 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36020 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36019 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36018 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36013.xml 2024-10-16 01:22:09.797522000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36013.xml.new 2024-10-29 01:17:25.939970000 +0100 @@ -14,13 +14,13 @@ 1 - 48 - 2024-10-15T23:22:09Z + 49 + 2024-10-29T00:17:25Z current 2024-05-29T23:09:41Z - 2024-10-15T23:22:09Z + 2024-10-29T00:17:25Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -194,6 +194,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -2019,6 +2034,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -4061,6 +4109,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-36012 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36011 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36010 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36009 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36008 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36007 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36006 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36005 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36004.xml 2024-10-22 01:29:49.105805000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-36004.xml.new 2024-10-29 01:17:27.040945000 +0100 @@ -14,13 +14,13 @@ 1 - 48 - 2024-10-21T23:29:48Z + 49 + 2024-10-29T00:17:26Z current 2024-05-20T23:09:13Z - 2024-10-21T23:29:48Z + 2024-10-29T00:17:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -245,6 +245,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2306,6 +2321,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4676,6 +4724,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-36003 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36002 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36001 as CVE page is older than CVRF-CVE file. skipping CVE-2024-36000 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35999 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35996 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35995.xml 2024-10-16 01:22:22.961854000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35995.xml.new 2024-10-29 01:17:30.038893000 +0100 @@ -14,13 +14,13 @@ 1 - 55 - 2024-10-15T23:22:22Z + 56 + 2024-10-29T00:17:29Z current 2024-05-20T23:09:17Z - 2024-10-15T23:22:22Z + 2024-10-29T00:17:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -231,6 +231,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2247,6 +2262,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4549,6 +4597,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-35994 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35993 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35992 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35991 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35990 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35989 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35986 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35985 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35984 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35983 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35982 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35981 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35980 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35978.xml 2024-10-16 01:22:33.354815000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35978.xml.new 2024-10-29 01:17:31.803163000 +0100 @@ -14,13 +14,13 @@ 1 - 55 - 2024-10-15T23:22:32Z + 56 + 2024-10-29T00:17:31Z current 2024-05-20T23:09:21Z - 2024-10-15T23:22:32Z + 2024-10-29T00:17:31Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -169,6 +169,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2206,6 +2221,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4461,6 +4509,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-35977 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35975 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35974 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35973 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35972 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35971 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35970 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35968 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35967.xml 2024-10-16 01:22:41.112377000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35967.xml.new 2024-10-29 01:17:33.787072000 +0100 @@ -14,13 +14,13 @@ 1 - 54 - 2024-10-15T23:22:40Z + 55 + 2024-10-29T00:17:33Z current 2024-05-20T23:09:23Z - 2024-10-15T23:22:40Z + 2024-10-29T00:17:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -177,6 +177,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2214,6 +2229,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4477,6 +4525,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35966.xml 2024-10-16 01:22:42.040853000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35966.xml.new 2024-10-29 01:17:34.478019000 +0100 @@ -14,13 +14,13 @@ 1 - 55 - 2024-10-15T23:22:41Z + 56 + 2024-10-29T00:17:34Z current 2024-05-20T23:09:24Z - 2024-10-15T23:22:41Z + 2024-10-29T00:17:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -179,6 +179,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2216,6 +2231,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4481,6 +4529,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35965.xml 2024-10-16 01:22:43.101803000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35965.xml.new 2024-10-29 01:17:35.140019000 +0100 @@ -14,13 +14,13 @@ 1 - 50 - 2024-10-15T23:22:42Z + 51 + 2024-10-29T00:17:34Z current 2024-05-20T23:09:24Z - 2024-10-15T23:22:42Z + 2024-10-29T00:17:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -158,6 +158,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -2158,6 +2173,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.57.1 as a component of Image SLES15-SP5-Azure-Basic @@ -4365,6 +4413,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.57.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.57.1 Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.68.1 skipping CVE-2024-35964 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35963 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35962 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35961 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35959 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35950 skipping CVE-2024-35957 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35956 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35955 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35954 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35953 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35952 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35951 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35950.xml 2024-10-17 01:17:16.056668000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35950.xml.new 2024-10-29 01:17:36.711931000 +0100 @@ -14,13 +14,13 @@ 1 - 76 - 2024-10-16T23:17:15Z + 77 + 2024-10-29T00:17:36Z current 2024-05-20T23:09:27Z - 2024-10-16T23:17:15Z + 2024-10-29T00:17:36Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2791,21 +2791,36 @@ kernel-livepatch-5_14_21-150400_24_103-default-8-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1 @@ -2845,15 +2860,24 @@ kernel-livepatch-5_14_21-150500_13_30-rt-9-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_5-rt-15-150500.2.1 @@ -2884,15 +2908,24 @@ kernel-livepatch-5_14_21-150500_55_44-default-9-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 @@ -2929,15 +2962,27 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1 @@ -2968,15 +3013,27 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1 @@ -3268,12 +3325,21 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-3-8.6.1 + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 + kgraft-patch-4_12_14-122_222-default-1-8.3.1 @@ -6631,6 +6697,72 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -7889,6 +8021,30 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35949.xml 2024-10-22 01:30:45.088855000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35949.xml.new 2024-10-29 01:17:37.288928000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-21T23:30:44Z + 38 + 2024-10-29T00:17:36Z current 2024-05-20T23:09:27Z - 2024-10-21T23:30:44Z + 2024-10-29T00:17:36Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -174,6 +174,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1910,6 +1925,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3862,6 +3910,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-35948 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35946 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35945 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35943 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35942 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35940 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35939 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35938 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35937 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35936 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35934.xml 2024-10-22 01:30:59.343122000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35934.xml.new 2024-10-29 01:17:39.697786000 +0100 @@ -14,13 +14,13 @@ 1 - 47 - 2024-10-21T23:30:58Z + 48 + 2024-10-29T00:17:39Z current 2024-05-20T23:09:31Z - 2024-10-21T23:30:58Z + 2024-10-29T00:17:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -215,6 +215,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2264,6 +2279,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4625,6 +4673,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35933.xml 2024-10-22 01:31:00.453056000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35933.xml.new 2024-10-29 01:17:41.296174000 +0100 @@ -14,13 +14,13 @@ 1 - 50 - 2024-10-21T23:30:59Z + 51 + 2024-10-29T00:17:39Z current 2024-05-20T23:09:31Z - 2024-10-21T23:30:59Z + 2024-10-29T00:17:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -159,6 +159,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -2135,6 +2150,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.57.1 as a component of Image SLES15-SP5-Azure-Basic @@ -4280,6 +4328,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.57.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.57.1 Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.68.1 skipping CVE-2024-35932 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35931 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35929 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35928 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35927 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35926 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35924 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35921 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35920 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35919 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35918 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35917 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35916 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35915.xml 2024-10-16 01:23:08.064548000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35915.xml.new 2024-10-29 01:17:43.910033000 +0100 @@ -14,13 +14,13 @@ 1 - 50 - 2024-10-15T23:23:07Z + 51 + 2024-10-29T00:17:43Z current 2024-05-20T23:09:34Z - 2024-10-15T23:23:07Z + 2024-10-29T00:17:43Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -167,6 +167,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -2167,6 +2182,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.57.1 as a component of Image SLES15-SP5-Azure-Basic @@ -4383,6 +4431,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.57.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.57.1 Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.68.1 skipping CVE-2024-35914 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35913 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35912 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35911 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35910 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35909 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35908 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35907 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35905 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35905.xml 2024-10-20 01:19:56.563833000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35905.xml.new 2024-10-29 01:17:45.032018000 +0100 @@ -14,13 +14,13 @@ 1 - 64 - 2024-10-19T23:19:56Z + 65 + 2024-10-29T00:17:44Z current 2024-05-20T23:09:36Z - 2024-10-19T23:19:56Z + 2024-10-29T00:17:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2190,18 +2190,87 @@ kernel-kvmsmall-vdso-6.4.0-150600.23.7.3 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1 + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1 + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 @@ -2211,9 +2280,15 @@ kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7 + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + kernel-macros @@ -4767,6 +4842,81 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -5097,24 +5247,9 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -5992,6 +6127,33 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel @@ -6103,11 +6265,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default skipping CVE-2024-35904 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35903 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35902 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35901 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35900 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35899 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35898 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35897 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35896 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35895 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35894 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35893.xml 2024-10-16 01:23:18.734411000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35893.xml.new 2024-10-29 01:17:45.790978000 +0100 @@ -14,13 +14,13 @@ 1 - 46 - 2024-10-15T23:23:18Z + 47 + 2024-10-29T00:17:45Z current 2024-05-20T23:09:39Z - 2024-10-15T23:23:18Z + 2024-10-29T00:17:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -245,6 +245,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2306,6 +2321,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4670,6 +4718,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-35892 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35891 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35890 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35889 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35888 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35887.xml 2024-10-16 01:23:22.728729000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35887.xml.new 2024-10-29 01:17:46.515943000 +0100 @@ -14,13 +14,13 @@ 1 - 61 - 2024-10-15T23:23:22Z + 62 + 2024-10-29T00:17:46Z current 2024-05-20T23:09:41Z - 2024-10-15T23:23:22Z + 2024-10-29T00:17:46Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2378,41 +2378,41 @@ ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4708,18 +4708,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.219.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.219.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.219.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.219.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-35885 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35884 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35883 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35882 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35880 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35879 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35878 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35875 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35874 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35873 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35872 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35867 skipping CVE-2024-35869 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35868 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35867.xml 2024-10-22 01:32:07.429090000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35867.xml.new 2024-10-29 01:17:50.505171000 +0100 @@ -14,13 +14,13 @@ 1 - 57 - 2024-10-21T23:32:06Z + 58 + 2024-10-29T00:17:49Z current 2024-05-20T23:09:45Z - 2024-10-21T23:32:06Z + 2024-10-29T00:17:49Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2297,21 +2297,114 @@ kernel-kvmsmall-vdso-6.4.0-150600.23.7.3 + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7 + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + kernel-macros @@ -2525,6 +2618,30 @@ kernel-zfcpdump-6.4.0-150600.23.7.3 + + kgraft-patch-4_12_14-122_179-default-14-2.1 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 + kgraft-patch-4_12_14-122_222-default-1-8.3.1 @@ -5198,6 +5315,123 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -6433,6 +6667,47 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel skipping CVE-2024-35866 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35864 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35864.xml 2024-10-14 01:21:05.765479000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35864.xml.new 2024-10-29 01:17:52.487193000 +0100 @@ -14,13 +14,13 @@ 1 - 66 - 2024-10-13T23:21:05Z + 67 + 2024-10-29T00:17:51Z current 2024-05-20T23:09:45Z - 2024-10-13T23:21:05Z + 2024-10-29T00:17:51Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2530,33 +2530,183 @@ kernel-kvmsmall-vdso-6.4.0-150600.23.7.3 + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1 + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1 + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1 + + kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1 kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7 + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + kernel-macros @@ -2827,6 +2977,30 @@ kernel-zfcpdump-6.4.0-150600.23.7.3 + + kgraft-patch-4_12_14-122_179-default-14-2.1 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 + kgraft-patch-4_12_14-122_222-default-1-8.3.1 @@ -6016,6 +6190,180 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -7203,6 +7551,66 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35863 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35863.xml 2024-10-14 01:21:06.456464000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35863.xml.new 2024-10-29 01:17:53.685041000 +0100 @@ -14,13 +14,13 @@ 1 - 61 - 2024-10-13T23:21:06Z + 62 + 2024-10-29T00:17:52Z current 2024-05-20T23:09:45Z - 2024-10-13T23:21:06Z + 2024-10-29T00:17:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2292,21 +2292,114 @@ kernel-kvmsmall-vdso-6.4.0-150600.23.7.3 + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7 + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + kernel-macros @@ -2520,6 +2613,30 @@ kernel-zfcpdump-6.4.0-150600.23.7.3 + + kgraft-patch-4_12_14-122_179-default-14-2.1 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 + kgraft-patch-4_12_14-122_222-default-1-8.3.1 @@ -5193,6 +5310,123 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -6395,6 +6629,47 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35862 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35862.xml 2024-10-14 01:21:07.284459000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35862.xml.new 2024-10-29 01:17:54.722956000 +0100 @@ -14,13 +14,13 @@ 1 - 62 - 2024-10-13T23:21:06Z + 63 + 2024-10-29T00:17:54Z current 2024-05-20T23:09:46Z - 2024-10-13T23:21:06Z + 2024-10-29T00:17:54Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2506,33 +2506,183 @@ kernel-kvmsmall-vdso-6.4.0-150600.23.7.3 + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1 + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1 + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1 + + kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1 kernel-livepatch-6_4_0-150600_10_5-rt-1-150600.1.5.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7 + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + kernel-macros @@ -2785,6 +2935,30 @@ kernel-zfcpdump-6.4.0-150600.23.7.3 + + kgraft-patch-4_12_14-122_179-default-14-2.1 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 + kgraft-patch-4_12_14-122_222-default-1-8.3.1 @@ -5932,6 +6106,180 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -7117,6 +7465,66 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + SUSE Linux Enterprise Micro 5.0:kernel-default SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35861 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35861.xml 2024-10-22 01:32:13.499719000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35861.xml.new 2024-10-29 01:17:55.659953000 +0100 @@ -14,13 +14,13 @@ 1 - 66 - 2024-10-21T23:32:12Z + 67 + 2024-10-29T00:17:55Z current 2024-05-20T23:09:46Z - 2024-10-21T23:32:12Z + 2024-10-29T00:17:55Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2535,21 +2535,36 @@ kernel-livepatch-5_14_21-150400_24_103-default-10-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1 @@ -2577,21 +2592,36 @@ kernel-livepatch-5_14_21-150500_13_30-rt-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 @@ -2613,21 +2643,36 @@ kernel-livepatch-5_14_21-150500_55_44-default-11-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 @@ -2655,15 +2700,27 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1 @@ -2688,15 +2745,27 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1 @@ -2706,6 +2775,9 @@ kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7 @@ -5988,6 +6060,78 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + cluster-md-kmp-default as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 @@ -7223,6 +7367,32 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default skipping CVE-2024-35860 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35859 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35858 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35857 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35856 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35855 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35854 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35853 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35852 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35851 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35850 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35849 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35848 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35847 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35846 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35845 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35844 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35843 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35842 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35841 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35840 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35839 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35838 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35837.xml 2024-10-16 01:23:48.515846000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35837.xml.new 2024-10-29 01:17:56.519876000 +0100 @@ -14,13 +14,13 @@ 1 - 54 - 2024-10-15T23:23:48Z + 55 + 2024-10-29T00:17:56Z current 2024-05-20T23:09:52Z - 2024-10-15T23:23:48Z + 2024-10-29T00:17:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -170,6 +170,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2207,6 +2222,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4463,6 +4511,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-35836 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35834 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35833 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35832 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35831 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35830 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35829 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35827 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35826 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35825 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35824 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35823 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35822 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35821 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35819.xml 2024-10-22 01:33:01.756684000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35819.xml.new 2024-10-29 01:18:00.713209000 +0100 @@ -14,13 +14,13 @@ 1 - 60 - 2024-10-21T23:33:01Z + 61 + 2024-10-29T00:17:58Z current 2024-05-20T23:09:58Z - 2024-10-21T23:33:01Z + 2024-10-29T00:17:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2317,41 +2317,41 @@ ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4626,18 +4626,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35817 skipping CVE-2024-35818 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35817.xml 2024-10-22 01:33:04.121083000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35817.xml.new 2024-10-29 01:18:02.244071000 +0100 @@ -14,13 +14,13 @@ 1 - 54 - 2024-10-21T23:33:03Z + 55 + 2024-10-29T00:18:00Z current 2024-05-20T23:09:58Z - 2024-10-21T23:33:03Z + 2024-10-29T00:18:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2201,18 +2201,30 @@ kernel-livepatch-5_14_21-150400_24_103-default-9-150400.2.2 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 @@ -2246,12 +2258,18 @@ kernel-livepatch-5_14_21-150500_13_30-rt-10-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 @@ -2273,12 +2291,18 @@ kernel-livepatch-5_14_21-150500_55_44-default-10-150500.2.2 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 @@ -2288,6 +2312,9 @@ kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_7-default-1-150600.13.3.7 @@ -4925,6 +4952,33 @@ klp-build-0~20240902.c95cc9e-1.1 as a component of openSUSE Tumbleweed + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -6080,6 +6134,17 @@ openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 openSUSE Tumbleweed:klp-build-0~20240902.c95cc9e-1.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel skipping CVE-2024-35816 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35815 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35814 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35813 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35811 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35810 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35809 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35808 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35806.xml 2024-10-16 01:23:59.665749000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35806.xml.new 2024-10-29 01:18:04.616952000 +0100 @@ -14,13 +14,13 @@ 1 - 53 - 2024-10-15T23:23:59Z + 54 + 2024-10-29T00:18:04Z current 2024-05-20T23:10:01Z - 2024-10-15T23:23:59Z + 2024-10-29T00:18:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -171,6 +171,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2181,6 +2196,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4399,6 +4447,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-35804 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35803 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35802 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35801 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35800 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35799 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35798 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35797 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35796 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35795 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35794 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35793 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35792 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35790 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35789 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35788 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35787 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35786 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35785 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35784 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-35434 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-35434 skipping CVE-2024-35329 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35328 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35326 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35325 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35255 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35242 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35241 skipping CVE-2024-35235 as CVE page is older than CVRF-CVE file. skipping CVE-2024-35221 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-35195 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35195.xml 2024-10-14 01:21:49.233723000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-35195.xml.new 2024-10-29 01:18:10.469127000 +0100 @@ -14,13 +14,13 @@ 1 - 58 - 2024-10-13T23:21:48Z + 59 + 2024-10-29T00:18:10Z current 2024-05-22T23:09:50Z - 2024-10-13T23:21:48Z + 2024-10-29T00:18:10Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1927,14 +1927,14 @@ python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-GCE-BYOS + + python-requests-2.24.0-8.20.1 as a component of Image SLES12-SP5-GCE-BYOS - - python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + python-requests-2.24.0-8.20.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + python-requests-2.24.0-8.20.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand python-requests-2.24.0-8.17.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3129,9 +3129,9 @@ Image SLES12-SP5-EC2-On-Demand:python-requests-2.24.0-8.17.1 Image SLES12-SP5-EC2-SAP-BYOS:python-requests-2.24.0-8.17.1 Image SLES12-SP5-EC2-SAP-On-Demand:python-requests-2.24.0-8.17.1 - Image SLES12-SP5-GCE-BYOS:python-requests-2.24.0-8.17.1 - Image SLES12-SP5-GCE-SAP-BYOS:python-requests-2.24.0-8.17.1 - Image SLES12-SP5-GCE-SAP-On-Demand:python-requests-2.24.0-8.17.1 + Image SLES12-SP5-GCE-BYOS:python-requests-2.24.0-8.20.1 + Image SLES12-SP5-GCE-SAP-BYOS:python-requests-2.24.0-8.20.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python-requests-2.24.0-8.20.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:python-requests-2.24.0-8.17.1 Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:python-requests-2.24.0-8.17.1 Image SLES15-SP3-BYOS-Azure:python3-requests-2.25.1-150300.3.9.1 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-35192 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-35192 skipping CVE-2024-35176 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-34703 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-34703 skipping CVE-2024-34777 as CVE page is older than CVRF-CVE file. skipping CVE-2024-34750 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-34702 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-34702 skipping CVE-2024-34580 as CVE page is older than CVRF-CVE file. skipping CVE-2024-34459 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34397 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34397.xml 2024-10-20 01:20:58.035599000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34397.xml.new 2024-10-29 01:18:18.341246000 +0100 @@ -14,13 +14,13 @@ 1 - 72 - 2024-10-19T23:20:57Z + 73 + 2024-10-29T00:18:17Z current 2024-05-08T23:09:06Z - 2024-10-19T23:20:57Z + 2024-10-29T00:18:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2931,20 +2931,20 @@ libgthread-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + glib2-tools-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS - - libgio-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + libgio-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS - - libglib-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + libglib-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS - - libgmodule-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + libgmodule-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS - - libgobject-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-BYOS + + libgobject-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-BYOS glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-On-Demand @@ -2961,41 +2961,41 @@ libgobject-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-On-Demand - - glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + glib2-tools-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - libgio-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + libgio-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - libglib-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + libglib-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - libgmodule-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + libgmodule-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - libgobject-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + libgobject-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - libgthread-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + libgthread-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + glib2-tools-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - libgio-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + libgio-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - libglib-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + libglib-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - libgmodule-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + libgmodule-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - libgobject-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + libgobject-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - libgthread-2_0-0-2.48.2-12.37.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + libgthread-2_0-0-2.48.2-12.40.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand glib2-tools-2.48.2-12.37.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -7254,42 +7254,6 @@ glib2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP4 - - glib2-lang as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - glib2-tools as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgio-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgio-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libglib-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libglib-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgmodule-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgmodule-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgobject-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgobject-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgthread-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgthread-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - glib2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -7841,28 +7805,28 @@ Image SLES12-SP5-EC2-SAP-On-Demand:libgmodule-2_0-0-2.48.2-12.37.1 Image SLES12-SP5-EC2-SAP-On-Demand:libgobject-2_0-0-2.48.2-12.37.1 Image SLES12-SP5-EC2-SAP-On-Demand:libgthread-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-BYOS:glib2-tools-2.48.2-12.37.1 - Image SLES12-SP5-GCE-BYOS:libgio-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-BYOS:libglib-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-BYOS:libgmodule-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-BYOS:libgobject-2_0-0-2.48.2-12.37.1 + Image SLES12-SP5-GCE-BYOS:glib2-tools-2.48.2-12.40.1 + Image SLES12-SP5-GCE-BYOS:libgio-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-BYOS:libglib-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-BYOS:libgmodule-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-BYOS:libgobject-2_0-0-2.48.2-12.40.1 Image SLES12-SP5-GCE-On-Demand:glib2-tools-2.48.2-12.37.1 Image SLES12-SP5-GCE-On-Demand:libgio-2_0-0-2.48.2-12.37.1 Image SLES12-SP5-GCE-On-Demand:libglib-2_0-0-2.48.2-12.37.1 Image SLES12-SP5-GCE-On-Demand:libgmodule-2_0-0-2.48.2-12.37.1 Image SLES12-SP5-GCE-On-Demand:libgobject-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-BYOS:glib2-tools-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-BYOS:libgio-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-BYOS:libglib-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-BYOS:libgmodule-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-BYOS:libgobject-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-BYOS:libgthread-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-On-Demand:glib2-tools-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-On-Demand:libgio-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-On-Demand:libglib-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-On-Demand:libgmodule-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-On-Demand:libgobject-2_0-0-2.48.2-12.37.1 - Image SLES12-SP5-GCE-SAP-On-Demand:libgthread-2_0-0-2.48.2-12.37.1 + Image SLES12-SP5-GCE-SAP-BYOS:glib2-tools-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-BYOS:libgio-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-BYOS:libglib-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-BYOS:libgmodule-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-BYOS:libgobject-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-BYOS:libgthread-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-On-Demand:glib2-tools-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libgio-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libglib-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libgmodule-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libgobject-2_0-0-2.48.2-12.40.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libgthread-2_0-0-2.48.2-12.40.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:glib2-tools-2.48.2-12.37.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libgio-2_0-0-2.48.2-12.37.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libglib-2_0-0-2.48.2-12.37.1 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-34340 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-34340 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34158 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34158.xml 2024-10-27 01:14:14.492144000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34158.xml.new 2024-10-29 01:18:20.070228000 +0100 @@ -14,13 +14,13 @@ 1 - 17 - 2024-10-26T23:14:14Z + 18 + 2024-10-29T00:18:19Z current 2024-09-05T23:16:37Z - 2024-10-26T23:14:14Z + 2024-10-29T00:18:19Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -300,6 +300,24 @@ go1.22-libstd-1.22.7-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.7-1.1 @@ -327,6 +345,24 @@ go1.23-libstd-1.23.1-1.1 + + go1.23-openssl-1.23.2.2-150000.1.3.1 + + + go1.23-openssl-1.23.2.2-150600.13.3.1 + + + go1.23-openssl-doc-1.23.2.2-150000.1.3.1 + + + go1.23-openssl-doc-1.23.2.2-150600.13.3.1 + + + go1.23-openssl-race-1.23.2.2-150000.1.3.1 + + + go1.23-openssl-race-1.23.2.2-150600.13.3.1 + go1.23-race-1.23.1-1.1 @@ -1365,6 +1401,78 @@ go1.23-race-1.23.1-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6 + @@ -1622,6 +1730,32 @@ openSUSE Tumbleweed:go1.23-libstd-1.23.1-1.1 openSUSE Tumbleweed:go1.23-race-1.23.1-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-1.23.2.2-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-race-1.23.2.2-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.2.2-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.2.2-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.23-openssl-1.23.2.2-150000.1.3.1 + openSUSE Leap 15.5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1 + openSUSE Leap 15.5:go1.23-openssl-race-1.23.2.2-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.23-openssl-1.23.2.2-150600.13.3.1 + openSUSE Leap 15.6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1 + openSUSE Leap 15.6:go1.23-openssl-race-1.23.2.2-150600.13.3.1 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34156 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34156.xml 2024-10-27 01:14:15.057206000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34156.xml.new 2024-10-29 01:18:20.753093000 +0100 @@ -14,13 +14,13 @@ 1 - 20 - 2024-10-26T23:14:14Z + 21 + 2024-10-29T00:18:20Z current 2024-09-05T23:16:37Z - 2024-10-26T23:14:14Z + 2024-10-29T00:18:20Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -337,6 +337,24 @@ go1.22-libstd-1.22.7-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.7-1.1 @@ -364,6 +382,24 @@ go1.23-libstd-1.23.1-1.1 + + go1.23-openssl-1.23.2.2-150000.1.3.1 + + + go1.23-openssl-1.23.2.2-150600.13.3.1 + + + go1.23-openssl-doc-1.23.2.2-150000.1.3.1 + + + go1.23-openssl-doc-1.23.2.2-150600.13.3.1 + + + go1.23-openssl-race-1.23.2.2-150000.1.3.1 + + + go1.23-openssl-race-1.23.2.2-150600.13.3.1 + go1.23-race-1.23.1-1.1 @@ -1465,6 +1501,78 @@ kyverno-zsh-completion-1.12.6-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6 + @@ -1734,6 +1842,32 @@ openSUSE Tumbleweed:kyverno-fish-completion-1.12.6-1.1 openSUSE Tumbleweed:kyverno-zsh-completion-1.12.6-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-1.23.2.2-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-race-1.23.2.2-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.2.2-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.2.2-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.23-openssl-1.23.2.2-150000.1.3.1 + openSUSE Leap 15.5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1 + openSUSE Leap 15.5:go1.23-openssl-race-1.23.2.2-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.23-openssl-1.23.2.2-150600.13.3.1 + openSUSE Leap 15.6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1 + openSUSE Leap 15.6:go1.23-openssl-race-1.23.2.2-150600.13.3.1 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34155 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34155.xml 2024-10-27 01:14:15.675076000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-34155.xml.new 2024-10-29 01:18:21.817042000 +0100 @@ -14,13 +14,13 @@ 1 - 19 - 2024-10-26T23:14:15Z + 20 + 2024-10-29T00:18:21Z current 2024-09-05T23:16:37Z - 2024-10-26T23:14:15Z + 2024-10-29T00:18:21Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -304,6 +304,24 @@ go1.22-libstd-1.22.7-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.7-1.1 @@ -331,6 +349,24 @@ go1.23-libstd-1.23.1-1.1 + + go1.23-openssl-1.23.2.2-150000.1.3.1 + + + go1.23-openssl-1.23.2.2-150600.13.3.1 + + + go1.23-openssl-doc-1.23.2.2-150000.1.3.1 + + + go1.23-openssl-doc-1.23.2.2-150600.13.3.1 + + + go1.23-openssl-race-1.23.2.2-150000.1.3.1 + + + go1.23-openssl-race-1.23.2.2-150600.13.3.1 + go1.23-race-1.23.1-1.1 @@ -1375,6 +1411,78 @@ trivy-0.56.1-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.23-openssl-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.23-openssl-doc-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.23-openssl-race-1.23.2.2-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.23-openssl-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.23-openssl-doc-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.23-openssl-race-1.23.2.2-150600.13.3.1 as a component of openSUSE Leap 15.6 + @@ -1633,6 +1741,32 @@ openSUSE Tumbleweed:go1.23-race-1.23.1-1.1 openSUSE Tumbleweed:trivy-0.56.1-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-1.23.2.2-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.23-openssl-race-1.23.2.2-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-1.23.2.2-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-openssl-race-1.23.2.2-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.23-openssl-1.23.2.2-150000.1.3.1 + openSUSE Leap 15.5:go1.23-openssl-doc-1.23.2.2-150000.1.3.1 + openSUSE Leap 15.5:go1.23-openssl-race-1.23.2.2-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.23-openssl-1.23.2.2-150600.13.3.1 + openSUSE Leap 15.6:go1.23-openssl-doc-1.23.2.2-150600.13.3.1 + openSUSE Leap 15.6:go1.23-openssl-race-1.23.2.2-150600.13.3.1 + no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-34083 skipping CVE-2024-34088 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34064 skipping CVE-2024-34069 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-34062 skipping CVE-2024-34030 as CVE page is older than CVRF-CVE file. skipping CVE-2024-34027 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-33664 skipping CVE-2024-33871 as CVE page is older than CVRF-CVE file. skipping CVE-2024-33870 as CVE page is older than CVRF-CVE file. skipping CVE-2024-33869 as CVE page is older than CVRF-CVE file. skipping CVE-2024-33861 as CVE page is older than CVRF-CVE file. skipping CVE-2024-33847 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-33663 notsure where SUSE Liberty Linux 7 is contained? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33602 skipping CVE-2024-33621 as CVE page is older than CVRF-CVE file. skipping CVE-2024-33619 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33601 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33600 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33599 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-33427 skipping CVE-2024-32936 as CVE page is older than CVRF-CVE file. skipping CVE-2024-32650 as CVE page is older than CVRF-CVE file. skipping CVE-2024-32487 as CVE page is older than CVRF-CVE file. skipping CVE-2024-32465 as CVE page is older than CVRF-CVE file. skipping CVE-2024-32462 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-32230 skipping CVE-2024-32021 as CVE page is older than CVRF-CVE file. skipping CVE-2024-32020 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31755 skipping CVE-2024-32004 as CVE page is older than CVRF-CVE file. skipping CVE-2024-32002 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31951 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31950 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31949 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31948 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31852 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31744 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31578 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31497 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31460 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31460 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31459 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31459 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31458 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31458 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31445 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31445 skipping CVE-2024-31449 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31444 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31444 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-31443 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-31443 skipping CVE-2024-31228 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31227 as CVE page is older than CVRF-CVE file. CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2024-31146: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2024-31146: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Standard, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31146 CVE-2024-31146: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-31146: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-31146: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2024-31146: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-31146: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-31146: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-31145: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-EC2, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.5, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31145 CVE-2024-31145: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-31145: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-31145: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2024-31145: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31145: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-31145: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-31145: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2024-31143: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-GCE, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-31143 CVE-2024-31143: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-31143: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2024-31143: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-HPC-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2024-31143: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2024-31143: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2024-31143: no packages for openSUSE Leap Micro 5.5, but entry? skipping CVE-2024-31083 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31082 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31081 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31080 as CVE page is older than CVRF-CVE file. skipping CVE-2024-31076 as CVE page is older than CVRF-CVE file. skipping CVE-2024-30875 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-30261 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-30260 skipping CVE-2024-30205 as CVE page is older than CVRF-CVE file. skipping CVE-2024-30204 as CVE page is older than CVRF-CVE file. skipping CVE-2024-30203 as CVE page is older than CVRF-CVE file. skipping CVE-2024-30202 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-30171 skipping CVE-2024-30161 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29903 skipping CVE-2024-29944 as CVE page is older than CVRF-CVE file. skipping CVE-2024-29943 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29902 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-29894 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-29894 skipping CVE-2024-29511 as CVE page is older than CVRF-CVE file. skipping CVE-2024-29510 as CVE page is older than CVRF-CVE file. skipping CVE-2024-29509 as CVE page is older than CVRF-CVE file. skipping CVE-2024-29508 as CVE page is older than CVRF-CVE file. skipping CVE-2024-29507 as CVE page is older than CVRF-CVE file. skipping CVE-2024-29506 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29039 skipping CVE-2024-29040 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29038 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-29025 skipping CVE-2024-28882 as CVE page is older than CVRF-CVE file. skipping CVE-2024-28835 as CVE page is older than CVRF-CVE file. skipping CVE-2024-28834 as CVE page is older than CVRF-CVE file. skipping CVE-2024-28757 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-28397 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28219 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28182 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28180 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-28168.xml 2024-10-22 01:36:35.174008000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-28168.xml.new 2024-10-29 01:19:28.494061000 +0100 @@ -14,13 +14,13 @@ 1 - 4 - 2024-10-21T23:36:34Z + 5 + 2024-10-29T00:19:26Z current 2024-10-09T23:27:30Z - 2024-10-21T23:36:34Z + 2024-10-29T00:19:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -43,21 +43,10 @@ - - SUSE Linux Enterprise Module for Basesystem 15 SP5 - SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - SUSE Linux Enterprise Module for Basesystem 15 SP6 - - - SUSE Linux Enterprise Module for Development Tools 15 SP6 - - SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS @@ -79,26 +68,10 @@ - - SUSE Linux Enterprise Module for Basesystem 15 SP5 - SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - SUSE Linux Enterprise Module for Basesystem 15 SP6 - - - SUSE Linux Enterprise Module for Development Tools 15 SP6 - - - - - SUSE Linux Enterprise Module for Package Hub 15 SP6 - - SUSE Linux Enterprise Software Development Kit 12 SP5 @@ -119,27 +92,11 @@ SUSE Linux Enterprise Server 15 SP4-LTSS - - - SUSE Linux Enterprise Server 15 SP4-TERADATA - - - - SUSE Linux Enterprise Module for Basesystem 15 SP5 - SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - SUSE Linux Enterprise Module for Basesystem 15 SP6 - - - SUSE Linux Enterprise Module for Development Tools 15 SP6 - - SUSE Linux Enterprise Server Teradata 15 SP4 @@ -166,21 +123,10 @@ - - SUSE Linux Enterprise Module for Basesystem 15 SP5 - SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - SUSE Linux Enterprise Module for Basesystem 15 SP6 - - - SUSE Linux Enterprise Module for Development Tools 15 SP6 - - openSUSE Leap 15.5 @@ -196,264 +142,15 @@ openSUSE Tumbleweed - - javapackages-filesystem-6.3.4-150200.3.15.1 - - - javapackages-gradle-6.3.4-150200.3.15.1 - - - javapackages-ivy-6.3.4-150200.3.15.1 - - - javapackages-local-6.3.4-150200.3.15.1 - - - javapackages-tools-6.3.4-150200.3.15.1 - - - python3-javapackages-6.3.4-150200.3.15.1 - - - xmlgraphics-batik-1.18-150200.4.10.1 - - - xmlgraphics-batik-css-1.18-150200.4.10.1 - - - xmlgraphics-batik-demo-1.18-150200.4.10.1 - - - xmlgraphics-batik-javadoc-1.18-150200.4.10.1 - - - xmlgraphics-batik-rasterizer-1.18-150200.4.10.1 - - - xmlgraphics-batik-slideshow-1.18-150200.4.10.1 - - - xmlgraphics-batik-squiggle-1.18-150200.4.10.1 - - - xmlgraphics-batik-svgpp-1.18-150200.4.10.1 - - - xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1 - - - xmlgraphics-commons-2.10-150200.3.10.1 - - - xmlgraphics-commons-javadoc-2.10-150200.3.10.1 - xmlgraphics-fop xmlgraphics-fop-2.10-1.1 - - xmlgraphics-fop-2.10-150200.13.10.1 - xmlgraphics-fop-2.10-1.1 as a component of openSUSE Tumbleweed - - javapackages-filesystem-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 - - - javapackages-tools-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 - - - python3-javapackages-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5 - - - javapackages-filesystem-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 - - - javapackages-tools-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 - - - python3-javapackages-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 - - - javapackages-gradle-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - javapackages-ivy-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - javapackages-local-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - xmlgraphics-batik-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - xmlgraphics-commons-2.10-150200.3.10.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - xmlgraphics-fop-2.10-150200.13.10.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 - - - javapackages-gradle-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 - - - javapackages-ivy-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 - - - javapackages-local-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 - - - xmlgraphics-batik-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6 - - - xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6 - - - xmlgraphics-commons-2.10-150200.3.10.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6 - - - javapackages-filesystem-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - javapackages-gradle-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - javapackages-ivy-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - javapackages-local-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - javapackages-tools-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - python3-javapackages-6.3.4-150200.3.15.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - xmlgraphics-batik-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - xmlgraphics-commons-2.10-150200.3.10.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - xmlgraphics-fop-2.10-150200.13.10.1 as a component of SUSE Linux Enterprise Server 15 SP4-TERADATA - - - javapackages-filesystem-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5 - - - javapackages-gradle-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5 - - - javapackages-ivy-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5 - - - javapackages-local-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5 - - - javapackages-tools-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5 - - - python3-javapackages-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-batik-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-batik-demo-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-batik-javadoc-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-batik-rasterizer-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-batik-slideshow-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-batik-squiggle-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-batik-svgpp-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-commons-2.10-150200.3.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-commons-javadoc-2.10-150200.3.10.1 as a component of openSUSE Leap 15.5 - - - xmlgraphics-fop-2.10-150200.13.10.1 as a component of openSUSE Leap 15.5 - - - javapackages-filesystem-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6 - - - javapackages-gradle-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6 - - - javapackages-ivy-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6 - - - javapackages-local-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6 - - - javapackages-tools-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6 - - - python3-javapackages-6.3.4-150200.3.15.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-batik-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-batik-css-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-batik-demo-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-batik-javadoc-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-batik-rasterizer-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-batik-slideshow-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-batik-squiggle-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-batik-svgpp-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-commons-2.10-150200.3.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-commons-javadoc-2.10-150200.3.10.1 as a component of openSUSE Leap 15.6 - - - xmlgraphics-fop-2.10-150200.13.10.1 as a component of openSUSE Leap 15.6 - xmlgraphics-fop as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS @@ -513,73 +210,6 @@ openSUSE Tumbleweed:xmlgraphics-fop-2.10-1.1 - - SUSE Linux Enterprise Module for Basesystem 15 SP5:javapackages-filesystem-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Basesystem 15 SP5:javapackages-tools-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-javapackages-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Basesystem 15 SP6:javapackages-filesystem-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Basesystem 15 SP6:javapackages-tools-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-javapackages-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Development Tools 15 SP5:javapackages-gradle-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Development Tools 15 SP5:javapackages-ivy-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Development Tools 15 SP5:javapackages-local-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Development Tools 15 SP5:xmlgraphics-batik-1.18-150200.4.10.1 - SUSE Linux Enterprise Module for Development Tools 15 SP5:xmlgraphics-batik-css-1.18-150200.4.10.1 - SUSE Linux Enterprise Module for Development Tools 15 SP5:xmlgraphics-commons-2.10-150200.3.10.1 - SUSE Linux Enterprise Module for Development Tools 15 SP5:xmlgraphics-fop-2.10-150200.13.10.1 - SUSE Linux Enterprise Module for Development Tools 15 SP6:javapackages-gradle-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Development Tools 15 SP6:javapackages-ivy-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Development Tools 15 SP6:javapackages-local-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Module for Package Hub 15 SP6:xmlgraphics-batik-1.18-150200.4.10.1 - SUSE Linux Enterprise Module for Package Hub 15 SP6:xmlgraphics-batik-css-1.18-150200.4.10.1 - SUSE Linux Enterprise Module for Package Hub 15 SP6:xmlgraphics-commons-2.10-150200.3.10.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-filesystem-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-gradle-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-ivy-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-local-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:javapackages-tools-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:python3-javapackages-6.3.4-150200.3.15.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:xmlgraphics-batik-1.18-150200.4.10.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:xmlgraphics-batik-css-1.18-150200.4.10.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:xmlgraphics-commons-2.10-150200.3.10.1 - SUSE Linux Enterprise Server 15 SP4-TERADATA:xmlgraphics-fop-2.10-150200.13.10.1 - openSUSE Leap 15.5:javapackages-filesystem-6.3.4-150200.3.15.1 - openSUSE Leap 15.5:javapackages-gradle-6.3.4-150200.3.15.1 - openSUSE Leap 15.5:javapackages-ivy-6.3.4-150200.3.15.1 - openSUSE Leap 15.5:javapackages-local-6.3.4-150200.3.15.1 - openSUSE Leap 15.5:javapackages-tools-6.3.4-150200.3.15.1 - openSUSE Leap 15.5:python3-javapackages-6.3.4-150200.3.15.1 - openSUSE Leap 15.5:xmlgraphics-batik-1.18-150200.4.10.1 - openSUSE Leap 15.5:xmlgraphics-batik-css-1.18-150200.4.10.1 - openSUSE Leap 15.5:xmlgraphics-batik-demo-1.18-150200.4.10.1 - openSUSE Leap 15.5:xmlgraphics-batik-javadoc-1.18-150200.4.10.1 - openSUSE Leap 15.5:xmlgraphics-batik-rasterizer-1.18-150200.4.10.1 - openSUSE Leap 15.5:xmlgraphics-batik-slideshow-1.18-150200.4.10.1 - openSUSE Leap 15.5:xmlgraphics-batik-squiggle-1.18-150200.4.10.1 - openSUSE Leap 15.5:xmlgraphics-batik-svgpp-1.18-150200.4.10.1 - openSUSE Leap 15.5:xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1 - openSUSE Leap 15.5:xmlgraphics-commons-2.10-150200.3.10.1 - openSUSE Leap 15.5:xmlgraphics-commons-javadoc-2.10-150200.3.10.1 - openSUSE Leap 15.5:xmlgraphics-fop-2.10-150200.13.10.1 - openSUSE Leap 15.6:javapackages-filesystem-6.3.4-150200.3.15.1 - openSUSE Leap 15.6:javapackages-gradle-6.3.4-150200.3.15.1 - openSUSE Leap 15.6:javapackages-ivy-6.3.4-150200.3.15.1 - openSUSE Leap 15.6:javapackages-local-6.3.4-150200.3.15.1 - openSUSE Leap 15.6:javapackages-tools-6.3.4-150200.3.15.1 - openSUSE Leap 15.6:python3-javapackages-6.3.4-150200.3.15.1 - openSUSE Leap 15.6:xmlgraphics-batik-1.18-150200.4.10.1 - openSUSE Leap 15.6:xmlgraphics-batik-css-1.18-150200.4.10.1 - openSUSE Leap 15.6:xmlgraphics-batik-demo-1.18-150200.4.10.1 - openSUSE Leap 15.6:xmlgraphics-batik-javadoc-1.18-150200.4.10.1 - openSUSE Leap 15.6:xmlgraphics-batik-rasterizer-1.18-150200.4.10.1 - openSUSE Leap 15.6:xmlgraphics-batik-slideshow-1.18-150200.4.10.1 - openSUSE Leap 15.6:xmlgraphics-batik-squiggle-1.18-150200.4.10.1 - openSUSE Leap 15.6:xmlgraphics-batik-svgpp-1.18-150200.4.10.1 - openSUSE Leap 15.6:xmlgraphics-batik-ttf2svg-1.18-150200.4.10.1 - openSUSE Leap 15.6:xmlgraphics-commons-2.10-150200.3.10.1 - openSUSE Leap 15.6:xmlgraphics-commons-javadoc-2.10-150200.3.10.1 - openSUSE Leap 15.6:xmlgraphics-fop-2.10-150200.13.10.1 - no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-28130 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28103 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-28085 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27983 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27982 No V5 entry found for CVE-2024-27980 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/27xxxx/CVE-2024-27980.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27980 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-27758 skipping CVE-2024-27913 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27903 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27851 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27850 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27838 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27834 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27833 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27830 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27820 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27808 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27766 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27459 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27437.xml 2024-10-16 01:25:40.673442000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27437.xml.new 2024-10-29 01:19:39.243022000 +0100 @@ -14,13 +14,13 @@ 1 - 48 - 2024-10-15T23:25:40Z + 49 + 2024-10-29T00:19:38Z current 2024-04-10T23:09:04Z - 2024-10-15T23:25:40Z + 2024-10-29T00:19:38Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -127,6 +127,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1978,6 +1993,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3943,6 +3991,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-27435 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27434 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27433 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27432 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27431 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27419 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27418 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27417 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27416 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27415 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27414 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27413 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27412 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27411 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27409 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27408 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27407 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27406 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27405 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27404 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27403 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27402 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27400 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27398 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27398.xml 2024-10-18 01:22:01.904790000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27398.xml.new 2024-10-29 01:19:49.115015000 +0100 @@ -14,13 +14,13 @@ 1 - 66 - 2024-10-17T23:22:01Z + 67 + 2024-10-29T00:19:48Z current 2024-05-13T23:09:39Z - 2024-10-17T23:22:01Z + 2024-10-29T00:19:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2896,18 +2896,30 @@ kernel-livepatch-5_14_21-150400_24_103-default-8-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 @@ -2947,24 +2959,39 @@ kernel-livepatch-5_14_21-150500_13_30-rt-9-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_5-rt-15-150500.2.1 kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 @@ -2989,21 +3016,36 @@ kernel-livepatch-5_14_21-150500_55_44-default-9-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 @@ -3037,12 +3079,21 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1 @@ -3073,12 +3124,21 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 @@ -3352,9 +3412,15 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-1-8.3.1 @@ -6664,6 +6730,72 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -7993,6 +8125,30 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base skipping CVE-2024-27397 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-27351 skipping CVE-2024-27395 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27394 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27393 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27392 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27391 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27390 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27389 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27388 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27316 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-27305 skipping CVE-2024-27306 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-27099 skipping CVE-2024-27282 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27281 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27280 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27267 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-27082 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-27082 skipping CVE-2024-27080 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27079 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27077 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27076 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27075 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27074 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27073 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27072 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27071 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27070 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27069 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27068 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27067 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27066 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27065 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27064 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27063 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27061 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27060 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27059 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27058 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27057 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27056 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27055 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27054 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27053 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27052 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27051 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27049 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27048 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27047 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27046 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27045 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27044 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27043 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27042 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27041 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27040 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27039 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27038 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27037 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27036 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27035 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27034 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27033 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27032 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27031 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27030 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27029 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27028 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27027 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27026 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27025.xml 2024-10-16 01:26:40.026825000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27025.xml.new 2024-10-29 01:19:58.927958000 +0100 @@ -14,13 +14,13 @@ 1 - 49 - 2024-10-15T23:26:39Z + 50 + 2024-10-29T00:19:58Z current 2024-05-02T23:10:42Z - 2024-10-15T23:26:39Z + 2024-10-29T00:19:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -169,6 +169,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2230,6 +2245,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4518,6 +4566,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27024.xml 2024-10-22 01:39:04.319701000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27024.xml.new 2024-10-29 01:19:59.942930000 +0100 @@ -14,13 +14,13 @@ 1 - 35 - 2024-10-21T23:39:03Z + 36 + 2024-10-29T00:19:59Z current 2024-05-02T23:10:42Z - 2024-10-21T23:39:03Z + 2024-10-29T00:19:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -591,6 +591,253 @@ openSUSE Leap Micro 5.5 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + cluster-md-kmp-64kb-5.14.21-150500.55.80.2 @@ -3422,6 +3669,229 @@ SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-source + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + skipping CVE-2024-27023 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27022 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27021 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27020.xml 2024-10-16 01:26:43.647652000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27020.xml.new 2024-10-29 01:20:00.769854000 +0100 @@ -14,13 +14,13 @@ 1 - 47 - 2024-10-15T23:26:43Z + 48 + 2024-10-29T00:20:00Z current 2024-05-03T23:09:33Z - 2024-10-15T23:26:43Z + 2024-10-29T00:20:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -175,6 +175,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2349,6 +2364,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4745,6 +4793,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27019.xml 2024-10-16 01:26:44.485663000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27019.xml.new 2024-10-29 01:20:01.717851000 +0100 @@ -14,13 +14,13 @@ 1 - 48 - 2024-10-15T23:26:43Z + 49 + 2024-10-29T00:20:01Z current 2024-05-03T23:09:34Z - 2024-10-15T23:26:43Z + 2024-10-29T00:20:01Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -175,6 +175,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2328,6 +2343,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4709,6 +4757,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-27018 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27017 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27016 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27015 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27012 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27011.xml 2024-10-16 01:26:50.206803000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-27011.xml.new 2024-10-29 01:20:06.415069000 +0100 @@ -14,13 +14,13 @@ 1 - 33 - 2024-10-15T23:26:49Z + 34 + 2024-10-29T00:20:04Z current 2024-05-03T23:09:36Z - 2024-10-15T23:26:49Z + 2024-10-29T00:20:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -146,6 +146,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1761,6 +1776,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3555,6 +3603,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-27010 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27009 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27007 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27006 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27005 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27004 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27003 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27002 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27001 as CVE page is older than CVRF-CVE file. skipping CVE-2024-27000 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26999 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26998 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26997 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26995 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26994 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26992 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26991 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26990 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26989 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26988 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26987 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26986 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26985 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26984 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26983 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26982 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26981 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26980 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26978 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26977 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26976 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26975 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26974 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26972 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26971 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26970 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26969 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26968 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26967 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26966 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26965 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26964 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26963 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26962 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26961 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26960 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26959 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26956 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26955 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26954 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26953 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26952 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26951 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26950 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26949 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26948 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26947 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26946 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26945 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26943 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26942 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26941 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26940 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26939 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26938 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26937 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26936 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26935 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26930 skipping CVE-2024-26933 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26932 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26931 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26930.xml 2024-10-22 01:40:47.773772000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26930.xml.new 2024-10-29 01:20:12.846775000 +0100 @@ -14,13 +14,13 @@ 1 - 73 - 2024-10-21T23:40:47Z + 74 + 2024-10-29T00:20:12Z current 2024-05-02T23:11:10Z - 2024-10-21T23:40:47Z + 2024-10-29T00:20:12Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2305,18 +2305,30 @@ kernel-livepatch-5_14_21-150400_24_103-default-7-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 @@ -2359,12 +2371,18 @@ kernel-livepatch-5_14_21-150500_13_30-rt-8-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_5-rt-14-150500.2.1 @@ -2392,12 +2410,18 @@ kernel-livepatch-5_14_21-150500_55_44-default-8-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 @@ -2695,6 +2719,9 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-1-8.3.1 @@ -5338,6 +5365,33 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -6653,6 +6707,17 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26928 skipping CVE-2024-26929 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26927 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26926 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26925 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26924.xml 2024-10-22 01:40:54.107965000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26924.xml.new 2024-10-29 01:20:14.331200000 +0100 @@ -14,13 +14,13 @@ 1 - 25 - 2024-10-21T23:40:53Z + 26 + 2024-10-29T00:20:13Z current 2024-04-26T23:09:31Z - 2024-10-21T23:40:53Z + 2024-10-29T00:20:13Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -113,6 +113,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -916,6 +931,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1897,6 +1945,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26923 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26923.xml 2024-10-18 01:23:04.434528000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26923.xml.new 2024-10-29 01:20:15.167140000 +0100 @@ -14,13 +14,13 @@ 1 - 77 - 2024-10-17T23:23:03Z + 78 + 2024-10-29T00:20:14Z current 2024-04-26T23:09:31Z - 2024-10-17T23:23:03Z + 2024-10-29T00:20:14Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3054,21 +3054,36 @@ kernel-livepatch-5_14_21-150400_24_103-default-7-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1 @@ -3114,27 +3129,45 @@ kernel-livepatch-5_14_21-150500_13_30-rt-8-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_5-rt-14-150500.2.1 kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1 @@ -3162,24 +3195,42 @@ kernel-livepatch-5_14_21-150500_55_44-default-8-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_7-default-13-150500.2.1 @@ -3216,15 +3267,27 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1 @@ -3258,15 +3321,27 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1 @@ -3585,12 +3660,21 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-3-8.6.1 + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 + kgraft-patch-4_12_14-122_222-default-1-8.3.1 @@ -7065,6 +7149,90 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -8391,6 +8559,36 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26921 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26920.xml 2024-10-14 01:24:45.044450000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26920.xml.new 2024-10-29 01:20:17.517981000 +0100 @@ -14,13 +14,13 @@ 1 - 54 - 2024-10-13T23:24:44Z + 55 + 2024-10-29T00:20:17Z current 2024-06-07T23:12:24Z - 2024-10-13T23:24:44Z + 2024-10-29T00:20:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2170,41 +2170,41 @@ ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.219.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3982,18 +3982,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.219.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.219.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.219.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.219.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.219.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-26919 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26918 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26917 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26916 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26915 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26914 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26913 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26912 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26911 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26910 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26909 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26906 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26903 skipping CVE-2024-26902 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26898 skipping CVE-2024-26899 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26897 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26896 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26895 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26893 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26892 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26891 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26890 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26889 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26888 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26887 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26886 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26885 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26883 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26882 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26881 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26880 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26879 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26877 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26876 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26875 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26874 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26873 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26872 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26871 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26870 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26869 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26868 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26867 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26866 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26865 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26864 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26862 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26861 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26860 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26859 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26858 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26856 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26852 skipping CVE-2024-26854 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26853 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26852.xml 2024-10-17 01:20:49.372483000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26852.xml.new 2024-10-29 01:20:27.882019000 +0100 @@ -14,13 +14,13 @@ 1 - 75 - 2024-10-16T23:20:48Z + 76 + 2024-10-29T00:20:26Z current 2024-04-18T23:08:59Z - 2024-10-16T23:20:48Z + 2024-10-29T00:20:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2614,18 +2614,30 @@ kernel-livepatch-5_14_21-150400_24_103-default-6-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 @@ -2671,15 +2683,24 @@ kernel-livepatch-5_14_21-150500_13_30-rt-7-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_5-rt-13-150500.2.1 @@ -2710,15 +2731,24 @@ kernel-livepatch-5_14_21-150500_55_44-default-7-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2 @@ -2755,9 +2785,15 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-1-150200.5.3.1 @@ -2791,9 +2827,15 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1 @@ -3055,6 +3097,9 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-1-8.3.1 @@ -5761,6 +5806,51 @@ kernel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -7001,6 +7091,23 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.52.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Micro 5.5:kernel-source-rt SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26851.xml 2024-10-16 01:28:12.246504000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26851.xml.new 2024-10-29 01:20:28.501975000 +0100 @@ -14,13 +14,13 @@ 1 - 34 - 2024-10-15T23:28:11Z + 35 + 2024-10-29T00:20:28Z current 2024-04-18T23:08:59Z - 2024-10-15T23:28:11Z + 2024-10-29T00:20:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -134,6 +134,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1759,6 +1774,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3505,6 +3553,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-26850 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26849 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26848 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26847 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26844 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26843 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26841 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26840 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26839 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26838 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26837 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26836 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26835 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26834 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26833 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26832 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26831 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26830.xml 2024-10-17 01:20:56.616611000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26830.xml.new 2024-10-29 01:20:30.864806000 +0100 @@ -14,13 +14,13 @@ 1 - 44 - 2024-10-16T23:20:56Z + 45 + 2024-10-29T00:20:30Z current 2024-04-18T23:09:03Z - 2024-10-16T23:20:56Z + 2024-10-29T00:20:30Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -120,6 +120,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1530,6 +1545,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3121,6 +3169,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26828 skipping CVE-2024-26829 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26828.xml 2024-10-18 01:23:34.525998000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26828.xml.new 2024-10-29 01:20:31.693770000 +0100 @@ -14,13 +14,13 @@ 1 - 68 - 2024-10-17T23:23:33Z + 69 + 2024-10-29T00:20:31Z current 2024-04-18T23:09:03Z - 2024-10-17T23:23:33Z + 2024-10-29T00:20:31Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2580,18 +2580,30 @@ kernel-livepatch-5_14_21-150400_24_103-default-7-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-1-150400.9.3.2 @@ -2637,24 +2649,39 @@ kernel-livepatch-5_14_21-150500_13_30-rt-8-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_5-rt-14-150500.2.1 kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-1-150500.11.3.1 @@ -2682,21 +2709,36 @@ kernel-livepatch-5_14_21-150500_55_44-default-8-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-1-150500.11.3.1 @@ -2733,12 +2775,21 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1 @@ -2772,12 +2823,21 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 @@ -3036,9 +3096,15 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-1-8.3.1 @@ -5793,6 +5859,72 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -6910,6 +7042,30 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26816 skipping CVE-2024-26827 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26826 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26825 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26824 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26823 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26822 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26821 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26820 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26819 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26818 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26817 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26815 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26814 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26813 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26812.xml 2024-10-16 01:28:32.124466000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26812.xml.new 2024-10-29 01:20:33.369183000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-15T23:28:31Z + 37 + 2024-10-29T00:20:32Z current 2024-04-16T23:09:16Z - 2024-10-15T23:28:31Z + 2024-10-29T00:20:32Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -126,6 +126,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1676,6 +1691,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3390,6 +3438,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-26811 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26810 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26809 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26808 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26807 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26806 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-26804 skipping CVE-2024-26803 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26802 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26801 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26800 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26799 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26798 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26797 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26796 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26795 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26794 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26793 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26792 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26790 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26789 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26788 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26787 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26786 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26785 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26784 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26783 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26782 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26781 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26780 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26779 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26777 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26776 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26773 skipping CVE-2024-26771 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26766 skipping CVE-2024-26769 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26768 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26767 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26766.xml 2024-10-22 01:43:09.583870000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26766.xml.new 2024-10-29 01:20:48.137967000 +0100 @@ -14,13 +14,13 @@ 1 - 63 - 2024-10-21T23:43:08Z + 64 + 2024-10-29T00:20:47Z current 2024-04-12T23:09:14Z - 2024-10-21T23:43:08Z + 2024-10-29T00:20:47Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1906,15 +1906,24 @@ kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1 @@ -1963,6 +1972,9 @@ kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 @@ -1993,6 +2005,9 @@ kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 @@ -3703,6 +3718,21 @@ kernel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -4845,6 +4875,13 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.52.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel skipping CVE-2024-26764 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26762 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-26759 skipping CVE-2024-26757 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26756 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26755 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26753 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26752 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26751 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26750 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26749 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26748 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26747 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26746 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26745 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26744 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26743 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26742 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26741 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26740 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26739 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26738 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26737 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26736 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26735.xml 2024-10-16 01:29:09.550516000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26735.xml.new 2024-10-29 01:20:52.642162000 +0100 @@ -14,13 +14,13 @@ 1 - 46 - 2024-10-15T23:29:09Z + 47 + 2024-10-29T00:20:52Z current 2024-04-05T23:08:41Z - 2024-10-15T23:29:09Z + 2024-10-29T00:20:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -119,6 +119,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1909,6 +1924,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3791,6 +3839,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26733 skipping CVE-2024-26734 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26732 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26731 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26730 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26729 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26728 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26727 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26726 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26725 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26724 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26723 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26722 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26721 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26704 skipping CVE-2024-26719 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26718 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26717 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26716 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26715 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26714 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26713 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26712 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26711 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26710 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26709 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26708 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26707 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26706 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26705 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26689 skipping CVE-2024-26703 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26702 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26700 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26699 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26698 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26697 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26696 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26695 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26694 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26693 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26692 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26691 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26690 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26687 skipping CVE-2024-26688 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26685 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26684 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26683 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26682 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26681 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26680 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26678 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26677.xml 2024-10-22 01:44:16.988839000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26677.xml.new 2024-10-29 01:20:59.336902000 +0100 @@ -14,13 +14,13 @@ 1 - 39 - 2024-10-21T23:44:16Z + 40 + 2024-10-29T00:20:58Z current 2024-04-05T23:08:45Z - 2024-10-21T23:44:16Z + 2024-10-29T00:20:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1696,6 +1711,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3621,6 +3669,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-26676 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26674 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26673 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26672 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26670 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26669 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26668.xml 2024-10-16 01:29:38.733707000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26668.xml.new 2024-10-29 01:21:01.981278000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-15T23:29:38Z + 39 + 2024-10-29T00:21:01Z current 2024-04-04T23:08:40Z - 2024-10-15T23:29:38Z + 2024-10-29T00:21:01Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -111,6 +111,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1753,6 +1768,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -3539,6 +3587,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 skipping CVE-2024-26667 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26666 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26665 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26664 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26663.xml 2024-10-16 01:29:40.999860000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26663.xml.new 2024-10-29 01:21:03.061151000 +0100 @@ -14,13 +14,13 @@ 1 - 51 - 2024-10-15T23:29:40Z + 52 + 2024-10-29T00:21:02Z current 2024-04-04T23:08:43Z - 2024-10-15T23:29:40Z + 2024-10-29T00:21:02Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -205,6 +205,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2268,6 +2283,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4538,6 +4586,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-26662 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26661 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26660 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26659.xml 2024-10-16 01:29:42.412795000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26659.xml.new 2024-10-29 01:21:03.812121000 +0100 @@ -14,13 +14,13 @@ 1 - 51 - 2024-10-15T23:29:41Z + 52 + 2024-10-29T00:21:03Z current 2024-04-04T23:08:44Z - 2024-10-15T23:29:41Z + 2024-10-29T00:21:03Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -126,6 +126,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1580,6 +1595,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3197,6 +3245,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2024-26658 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26657 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26656 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26655 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26654 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26653 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26652 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26642 skipping CVE-2024-26649 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26648 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26647 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26646 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26645 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26644 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26643 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26640 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26639 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26638 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26637 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26634 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26632 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26631 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26630 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26629 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26627 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26626 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26622 skipping CVE-2024-26623 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26622.xml 2024-10-22 01:44:58.473654000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26622.xml.new 2024-10-29 01:21:12.125136000 +0100 @@ -14,13 +14,13 @@ 1 - 79 - 2024-10-21T23:44:58Z + 80 + 2024-10-29T00:21:09Z current 2024-03-05T00:08:55Z - 2024-10-21T23:44:58Z + 2024-10-29T00:21:09Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2176,6 +2176,9 @@ kernel-livepatch-5_14_21-150400_24_103-default-4-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 @@ -2233,6 +2236,9 @@ kernel-livepatch-5_14_21-150500_13_30-rt-5-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 @@ -2266,6 +2272,9 @@ kernel-livepatch-5_14_21-150500_55_44-default-5-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 @@ -4969,6 +4978,15 @@ kernel-rt-5.14.21-150500.13.38.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -6132,6 +6150,11 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.38.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Micro 5.0:kernel-default SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default skipping CVE-2024-26621 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26620 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26619 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26618 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26617 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26616 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26615.xml 2024-10-16 01:30:07.149448000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26615.xml.new 2024-10-29 01:21:13.172129000 +0100 @@ -14,13 +14,13 @@ 1 - 49 - 2024-10-15T23:30:06Z + 50 + 2024-10-29T00:21:12Z current 2024-03-06T00:09:03Z - 2024-10-15T23:30:06Z + 2024-10-29T00:21:12Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -218,6 +218,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2289,6 +2304,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4665,6 +4713,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26614 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26610 skipping CVE-2024-26613 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26612 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26611 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26610.xml 2024-10-22 01:45:06.054749000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26610.xml.new 2024-10-29 01:21:16.039980000 +0100 @@ -14,13 +14,13 @@ 1 - 69 - 2024-10-21T23:45:05Z + 70 + 2024-10-29T00:21:15Z current 2024-03-13T00:09:06Z - 2024-10-21T23:45:05Z + 2024-10-29T00:21:15Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2156,15 +2156,24 @@ kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1 @@ -2216,15 +2225,24 @@ kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_5-rt-12-150500.2.1 @@ -2255,15 +2273,24 @@ kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2 @@ -2303,9 +2330,15 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1 @@ -4523,6 +4556,39 @@ kernel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -5602,6 +5668,19 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.52.1 + + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26585 skipping CVE-2024-26609 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26608 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26607 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26606 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26605 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26604 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26603 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26602 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26601 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26600 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26599 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26598 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26597 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26596 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26595 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26594 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26593 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26592 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26591 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26590 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26589 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26588 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26587 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26586 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26585.xml 2024-10-20 01:26:06.124954000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-26585.xml.new 2024-10-29 01:21:17.454858000 +0100 @@ -14,13 +14,13 @@ 1 - 79 - 2024-10-19T23:26:05Z + 80 + 2024-10-29T00:21:16Z current 2024-02-23T00:09:48Z - 2024-10-19T23:26:05Z + 2024-10-29T00:21:16Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2337,6 +2337,9 @@ kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 @@ -2394,6 +2397,9 @@ kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 @@ -2430,6 +2436,9 @@ kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 @@ -5469,6 +5478,15 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE CaaS Platform 4.0 @@ -5709,18 +5727,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -6757,6 +6763,11 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE CaaS Platform 4.0:kernel-default SUSE CaaS Platform 4.0:kernel-default-base @@ -6838,10 +6849,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base skipping CVE-2024-26584 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26583 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26582 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26581 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26461 skipping CVE-2024-26464 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26462 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26458 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-26308 skipping CVE-2024-26328 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26327 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26256 as CVE page is older than CVRF-CVE file. skipping CVE-2024-26130 as CVE page is older than CVRF-CVE file. skipping CVE-2024-25939 as CVE page is older than CVRF-CVE file. skipping CVE-2024-25744 as CVE page is older than CVRF-CVE file. skipping CVE-2024-25743 as CVE page is older than CVRF-CVE file. skipping CVE-2024-25742 as CVE page is older than CVRF-CVE file. skipping CVE-2024-25741 as CVE page is older than CVRF-CVE file. skipping CVE-2024-25740 as CVE page is older than CVRF-CVE file. skipping CVE-2024-25739 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25710 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25641 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-25641 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-25617 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25617 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25583 skipping CVE-2024-25584 as CVE page is older than CVRF-CVE file. skipping CVE-2024-25580 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25446 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25445 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25443 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-25442 skipping CVE-2024-25260 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25111 skipping CVE-2024-25112 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25110 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25082 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25081 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-25062 skipping CVE-2024-24986 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24980 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24974 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24968 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24864 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24821 skipping CVE-2024-24860 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24859 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24858 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24857 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24855 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24853 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24826 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24814 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24806 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-24792 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-24792 skipping CVE-2024-24795 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24791 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24791.xml 2024-10-26 01:16:46.317248000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24791.xml.new 2024-10-29 01:21:37.591799000 +0100 @@ -14,13 +14,13 @@ 1 - 25 - 2024-10-25T23:16:45Z + 26 + 2024-10-29T00:21:37Z current 2024-07-02T23:25:48Z - 2024-10-25T23:16:45Z + 2024-10-29T00:21:37Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -443,6 +443,24 @@ go1.22-libstd-1.22.5-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.5-1.1 @@ -1058,6 +1076,42 @@ istioctl-zsh-completion-1.22.3-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + go as a component of SUSE Enterprise Storage 7.1 @@ -1338,6 +1392,20 @@ openSUSE Tumbleweed:istioctl-bash-completion-1.22.3-1.1 openSUSE Tumbleweed:istioctl-zsh-completion-1.22.3-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + SUSE Enterprise Storage 7.1:go SUSE Enterprise Storage 7.1:go-doc no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24790 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24790.xml 2024-10-26 01:16:46.962217000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24790.xml.new 2024-10-29 01:21:38.249793000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-25T23:16:46Z + 32 + 2024-10-29T00:21:37Z current 2024-06-05T23:10:51Z - 2024-10-25T23:16:46Z + 2024-10-29T00:21:37Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -390,6 +390,24 @@ go1.22-libstd-1.22.4-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.4-1.1 @@ -828,6 +846,42 @@ kubelogin-0.1.4-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + go as a component of SUSE Enterprise Storage 7.1 @@ -1103,6 +1157,20 @@ openSUSE Tumbleweed:helmfile-zsh-completion-0.166.0-1.1 openSUSE Tumbleweed:kubelogin-0.1.4-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + SUSE Enterprise Storage 7.1:go SUSE Enterprise Storage 7.1:go-doc no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24789 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24789.xml 2024-10-26 01:16:47.552190000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24789.xml.new 2024-10-29 01:21:38.960774000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-25T23:16:47Z + 31 + 2024-10-29T00:21:38Z current 2024-06-05T23:10:51Z - 2024-10-25T23:16:47Z + 2024-10-29T00:21:38Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -441,6 +441,24 @@ go1.22-libstd-1.22.4-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.4-1.1 @@ -1020,6 +1038,42 @@ go1.22-race-1.22.4-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + go as a component of SUSE Enterprise Storage 7.1 @@ -1327,6 +1381,20 @@ openSUSE Tumbleweed:go1.22-libstd-1.22.4-1.1 openSUSE Tumbleweed:go1.22-race-1.22.4-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + SUSE Enterprise Storage 7.1:go SUSE Enterprise Storage 7.1:go-doc --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24788.xml 2024-09-28 01:25:14.534867000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24788.xml.new 2024-10-29 01:21:39.615219000 +0100 @@ -14,13 +14,13 @@ 1 - 16 - 2024-09-27T23:25:14Z + 17 + 2024-10-29T00:21:39Z current 2024-05-07T23:12:37Z - 2024-09-27T23:25:14Z + 2024-10-29T00:21:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -237,6 +237,24 @@ go1.22-libstd-1.22.3-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race @@ -504,6 +522,42 @@ traefik2-2.11.5-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + go1.21 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS @@ -662,6 +716,20 @@ openSUSE Tumbleweed:traefik-3.0.1-1.1 openSUSE Tumbleweed:traefik2-2.11.5-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21 SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.21-doc no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24787 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24787.xml 2024-10-26 01:16:48.427135000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24787.xml.new 2024-10-29 01:21:40.829136000 +0100 @@ -14,13 +14,13 @@ 1 - 17 - 2024-10-25T23:16:48Z + 18 + 2024-10-29T00:21:39Z current 2024-05-07T23:12:37Z - 2024-10-25T23:16:48Z + 2024-10-29T00:21:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -295,6 +295,24 @@ go1.22-libstd-1.22.3-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race @@ -556,6 +574,42 @@ go1.22-race-1.22.3-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + go as a component of SUSE Enterprise Storage 7.1 @@ -937,6 +991,20 @@ openSUSE Tumbleweed:go1.22-libstd-1.22.3-1.1 openSUSE Tumbleweed:go1.22-race-1.22.3-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + SUSE Enterprise Storage 7.1:go SUSE Enterprise Storage 7.1:go-doc no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24786 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24785 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24785.xml 2024-10-26 01:16:49.521100000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24785.xml.new 2024-10-29 01:21:44.951914000 +0100 @@ -14,13 +14,13 @@ 1 - 18 - 2024-10-25T23:16:49Z + 19 + 2024-10-29T00:21:44Z current 2024-03-07T00:10:42Z - 2024-10-25T23:16:49Z + 2024-10-29T00:21:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -252,6 +252,24 @@ go1.22-libstd-1.22.1-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.1-1.1 @@ -591,6 +609,42 @@ go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + @@ -699,6 +753,20 @@ openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1 openSUSE Tumbleweed:go1.22-race-1.22.1-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24784 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24784.xml 2024-10-26 01:16:50.179054000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24784.xml.new 2024-10-29 01:21:46.308973000 +0100 @@ -14,13 +14,13 @@ 1 - 20 - 2024-10-25T23:16:49Z + 21 + 2024-10-29T00:21:45Z current 2024-03-07T00:10:42Z - 2024-10-25T23:16:49Z + 2024-10-29T00:21:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -298,6 +298,24 @@ go1.22-libstd-1.22.1-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.1-1.1 @@ -799,6 +817,42 @@ go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + @@ -941,6 +995,20 @@ openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1 openSUSE Tumbleweed:go1.22-race-1.22.1-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24783 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24783.xml 2024-10-26 01:16:50.738034000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-24783.xml.new 2024-10-29 01:21:47.713788000 +0100 @@ -14,13 +14,13 @@ 1 - 23 - 2024-10-25T23:16:50Z + 24 + 2024-10-29T00:21:46Z current 2024-03-07T00:10:42Z - 2024-10-25T23:16:50Z + 2024-10-29T00:21:46Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -337,6 +337,24 @@ go1.22-libstd-1.22.1-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.1-1.1 @@ -907,6 +925,42 @@ go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + @@ -1063,6 +1117,20 @@ openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1 openSUSE Tumbleweed:go1.22-race-1.22.1-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-24758 skipping CVE-2024-24577 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24575 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24549 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24479 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24478 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24476 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24474 as CVE page is older than CVRF-CVE file. skipping CVE-2024-24246 as CVE page is older than CVRF-CVE file. skipping CVE-2024-23984 as CVE page is older than CVRF-CVE file. skipping CVE-2024-23981 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23848 skipping CVE-2024-23851 as CVE page is older than CVRF-CVE file. skipping CVE-2024-23850 as CVE page is older than CVRF-CVE file. skipping CVE-2024-23849 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-23837 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-23837 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23829 skipping CVE-2024-23807 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23653 skipping CVE-2024-23672 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23652 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23651 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23638 notsure where SUSE Linux Enterprise Module for Package Hub 15 SP4 is contained? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23334 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23307 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-23307.xml 2024-10-17 01:22:46.279851000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-23307.xml.new 2024-10-29 01:22:03.172979000 +0100 @@ -14,13 +14,13 @@ 1 - 84 - 2024-10-16T23:22:45Z + 85 + 2024-10-29T00:22:02Z current 2024-01-26T00:08:56Z - 2024-10-16T23:22:45Z + 2024-10-29T00:22:02Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2294,15 +2294,24 @@ kernel-livepatch-5_14_21-150400_24_103-default-7-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1 @@ -2348,12 +2357,18 @@ kernel-livepatch-5_14_21-150500_13_30-rt-8-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-1-150500.11.3.1 @@ -2387,12 +2402,18 @@ kernel-livepatch-5_14_21-150500_55_44-default-8-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-1-150500.11.7.1 @@ -2432,9 +2453,15 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-1-150200.5.3.1 @@ -2468,9 +2495,15 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1 @@ -2735,6 +2768,9 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-1-8.3.1 @@ -5381,6 +5417,42 @@ kernel-source-vanilla-6.8.2-1.1 as a component of openSUSE Tumbleweed + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Module for Basesystem 15 SP6 @@ -6465,6 +6537,20 @@ openSUSE Tumbleweed:kernel-source-6.8.2-1.1 openSUSE Tumbleweed:kernel-source-vanilla-6.8.2-1.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23284 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23280 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23263 skipping CVE-2024-23271 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23254 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23252 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-23184 skipping CVE-2024-23226 as CVE page is older than CVRF-CVE file. skipping CVE-2024-23222 as CVE page is older than CVRF-CVE file. skipping CVE-2024-23213 as CVE page is older than CVRF-CVE file. skipping CVE-2024-23206 as CVE page is older than CVRF-CVE file. skipping CVE-2024-23196 as CVE page is older than CVRF-CVE file. skipping CVE-2024-23185 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-23170 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22667 skipping CVE-2024-22705 as CVE page is older than CVRF-CVE file. skipping CVE-2024-22563 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-22373 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-22373 skipping CVE-2024-22386 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-22368 notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP6 is contained? notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP5 is contained? notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP4 is contained? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22232 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2024-22232 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-22232 skipping CVE-2024-22365 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22231 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2024-22231 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-22231 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22201 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22195 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-22189 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-22189 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22099 skipping CVE-2024-22123 as CVE page is older than CVRF-CVE file. skipping CVE-2024-22122 as CVE page is older than CVRF-CVE file. skipping CVE-2024-22121 as CVE page is older than CVRF-CVE file. skipping CVE-2024-22120 as CVE page is older than CVRF-CVE file. skipping CVE-2024-22119 as CVE page is older than CVRF-CVE file. skipping CVE-2024-22116 as CVE page is older than CVRF-CVE file. skipping CVE-2024-22114 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-22036 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/22xxxx/CVE-2024-22036.json:No such file or directory No V5 entry found for CVE-2024-22035 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/22xxxx/CVE-2024-22035.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22034 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-22033 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-22033 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22025 skipping CVE-2024-22029 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22020 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-22019 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-21892 skipping CVE-2024-21886 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21885 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21823 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21810 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21807 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21806 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-21626 skipping CVE-2024-21733 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21647 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21646 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21534 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21263 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21235.xml 2024-10-20 01:27:30.202592000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21235.xml.new 2024-10-29 01:22:27.604171000 +0100 @@ -14,13 +14,13 @@ 1 - 4 - 2024-10-19T23:27:29Z + 5 + 2024-10-29T00:22:27Z current 2024-10-16T23:23:14Z - 2024-10-19T23:27:29Z + 2024-10-29T00:22:27Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -268,6 +268,11 @@ openSUSE Leap 15.6 + + + openSUSE Tumbleweed + + java-1.8.0-openjdk-1.8.0.432.b06-2.el8 @@ -352,6 +357,9 @@ java-11-openjdk + + java-11-openjdk-11.0.25.0-1.1 + java-11-openjdk-11.0.25.0.9-2.el8 @@ -364,6 +372,9 @@ java-11-openjdk-demo + + java-11-openjdk-demo-11.0.25.0-1.1 + java-11-openjdk-demo-11.0.25.0.9-2.el8 @@ -379,6 +390,9 @@ java-11-openjdk-devel + + java-11-openjdk-devel-11.0.25.0-1.1 + java-11-openjdk-devel-11.0.25.0.9-2.el8 @@ -397,6 +411,9 @@ java-11-openjdk-headless + + java-11-openjdk-headless-11.0.25.0-1.1 + java-11-openjdk-headless-11.0.25.0.9-2.el8 @@ -412,6 +429,9 @@ java-11-openjdk-javadoc + + java-11-openjdk-javadoc-11.0.25.0-1.1 + java-11-openjdk-javadoc-11.0.25.0.9-2.el8 @@ -427,6 +447,9 @@ java-11-openjdk-jmods + + java-11-openjdk-jmods-11.0.25.0-1.1 + java-11-openjdk-jmods-11.0.25.0.9-2.el8 @@ -445,6 +468,9 @@ java-11-openjdk-src + + java-11-openjdk-src-11.0.25.0-1.1 + java-11-openjdk-src-11.0.25.0.9-2.el8 @@ -1306,6 +1332,27 @@ java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 as a component of SUSE Liberty Linux 9 + + java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + java-11-openjdk as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -1957,39 +2004,12 @@ java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-11-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-11-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-11-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_8_0-ibm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_8_0-ibm-alsa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-ibm-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-ibm-plugin as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_8_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_8_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -2623,6 +2643,13 @@ SUSE Liberty Linux 9:java-21-openjdk-static-libs-21.0.5.0.10-3.el9 SUSE Liberty Linux 9:java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 SUSE Liberty Linux 9:java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 + openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21217.xml 2024-10-20 01:27:30.876173000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21217.xml.new 2024-10-29 01:22:28.474159000 +0100 @@ -14,13 +14,13 @@ 1 - 4 - 2024-10-19T23:27:30Z + 5 + 2024-10-29T00:22:27Z current 2024-10-16T23:23:14Z - 2024-10-19T23:27:30Z + 2024-10-29T00:22:27Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -268,6 +268,11 @@ openSUSE Leap 15.6 + + + openSUSE Tumbleweed + + java-1.8.0-openjdk-1.8.0.432.b06-2.el8 @@ -352,6 +357,9 @@ java-11-openjdk + + java-11-openjdk-11.0.25.0-1.1 + java-11-openjdk-11.0.25.0.9-2.el8 @@ -364,6 +372,9 @@ java-11-openjdk-demo + + java-11-openjdk-demo-11.0.25.0-1.1 + java-11-openjdk-demo-11.0.25.0.9-2.el8 @@ -379,6 +390,9 @@ java-11-openjdk-devel + + java-11-openjdk-devel-11.0.25.0-1.1 + java-11-openjdk-devel-11.0.25.0.9-2.el8 @@ -397,6 +411,9 @@ java-11-openjdk-headless + + java-11-openjdk-headless-11.0.25.0-1.1 + java-11-openjdk-headless-11.0.25.0.9-2.el8 @@ -412,6 +429,9 @@ java-11-openjdk-javadoc + + java-11-openjdk-javadoc-11.0.25.0-1.1 + java-11-openjdk-javadoc-11.0.25.0.9-2.el8 @@ -427,6 +447,9 @@ java-11-openjdk-jmods + + java-11-openjdk-jmods-11.0.25.0-1.1 + java-11-openjdk-jmods-11.0.25.0.9-2.el8 @@ -445,6 +468,9 @@ java-11-openjdk-src + + java-11-openjdk-src-11.0.25.0-1.1 + java-11-openjdk-src-11.0.25.0.9-2.el8 @@ -1306,6 +1332,27 @@ java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 as a component of SUSE Liberty Linux 9 + + java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + java-11-openjdk as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -1957,39 +2004,12 @@ java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-11-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-11-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-11-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_8_0-ibm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_8_0-ibm-alsa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-ibm-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-ibm-plugin as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_8_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_8_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -2623,6 +2643,13 @@ SUSE Liberty Linux 9:java-21-openjdk-static-libs-21.0.5.0.10-3.el9 SUSE Liberty Linux 9:java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 SUSE Liberty Linux 9:java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 + openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21210.xml 2024-10-20 01:27:32.180966000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21210.xml.new 2024-10-29 01:22:29.506076000 +0100 @@ -14,13 +14,13 @@ 1 - 4 - 2024-10-19T23:27:31Z + 5 + 2024-10-29T00:22:29Z current 2024-10-16T23:23:14Z - 2024-10-19T23:27:31Z + 2024-10-29T00:22:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -268,6 +268,11 @@ openSUSE Leap 15.6 + + + openSUSE Tumbleweed + + java-1.8.0-openjdk-1.8.0.432.b06-2.el8 @@ -376,6 +381,9 @@ java-11-openjdk + + java-11-openjdk-11.0.25.0-1.1 + java-11-openjdk-11.0.25.0.9-2.el8 @@ -388,6 +396,9 @@ java-11-openjdk-demo + + java-11-openjdk-demo-11.0.25.0-1.1 + java-11-openjdk-demo-11.0.25.0.9-2.el8 @@ -403,6 +414,9 @@ java-11-openjdk-devel + + java-11-openjdk-devel-11.0.25.0-1.1 + java-11-openjdk-devel-11.0.25.0.9-2.el8 @@ -421,6 +435,9 @@ java-11-openjdk-headless + + java-11-openjdk-headless-11.0.25.0-1.1 + java-11-openjdk-headless-11.0.25.0.9-2.el8 @@ -436,6 +453,9 @@ java-11-openjdk-javadoc + + java-11-openjdk-javadoc-11.0.25.0-1.1 + java-11-openjdk-javadoc-11.0.25.0.9-2.el8 @@ -451,6 +471,9 @@ java-11-openjdk-jmods + + java-11-openjdk-jmods-11.0.25.0-1.1 + java-11-openjdk-jmods-11.0.25.0.9-2.el8 @@ -469,6 +492,9 @@ java-11-openjdk-src + + java-11-openjdk-src-11.0.25.0-1.1 + java-11-openjdk-src-11.0.25.0.9-2.el8 @@ -1366,6 +1392,27 @@ java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 as a component of SUSE Liberty Linux 9 + + java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + java-11-openjdk as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -2140,51 +2187,15 @@ java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-11-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-11-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-11-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_7_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_7_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_7_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_7_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_8_0-ibm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_8_0-ibm-alsa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-ibm-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-ibm-plugin as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_8_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_8_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -2914,6 +2925,13 @@ SUSE Liberty Linux 9:java-21-openjdk-static-libs-21.0.5.0.10-3.el9 SUSE Liberty Linux 9:java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 SUSE Liberty Linux 9:java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 + openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1 SUSE Linux Enterprise High Performance Computing 12 SP5:java-1_7_0-openjdk @@ -2958,9 +2976,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:java-1_7_0-openjdk SUSE Linux Enterprise Server Teradata 12 SP3:java-1_7_0-openjdk SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk - SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo - SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless openSUSE Leap 15.5:java-10-openjdk openSUSE Leap 15.5:java-10-openjdk-accessibility openSUSE Leap 15.5:java-10-openjdk-demo --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21208.xml 2024-10-20 01:27:32.992946000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-21208.xml.new 2024-10-29 01:22:30.459044000 +0100 @@ -14,13 +14,13 @@ 1 - 4 - 2024-10-19T23:27:32Z + 5 + 2024-10-29T00:22:29Z current 2024-10-16T23:23:15Z - 2024-10-19T23:27:32Z + 2024-10-29T00:22:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -268,6 +268,11 @@ openSUSE Leap 15.6 + + + openSUSE Tumbleweed + + java-1.8.0-openjdk-1.8.0.432.b06-2.el8 @@ -376,6 +381,9 @@ java-11-openjdk + + java-11-openjdk-11.0.25.0-1.1 + java-11-openjdk-11.0.25.0.9-2.el8 @@ -388,6 +396,9 @@ java-11-openjdk-demo + + java-11-openjdk-demo-11.0.25.0-1.1 + java-11-openjdk-demo-11.0.25.0.9-2.el8 @@ -403,6 +414,9 @@ java-11-openjdk-devel + + java-11-openjdk-devel-11.0.25.0-1.1 + java-11-openjdk-devel-11.0.25.0.9-2.el8 @@ -421,6 +435,9 @@ java-11-openjdk-headless + + java-11-openjdk-headless-11.0.25.0-1.1 + java-11-openjdk-headless-11.0.25.0.9-2.el8 @@ -436,6 +453,9 @@ java-11-openjdk-javadoc + + java-11-openjdk-javadoc-11.0.25.0-1.1 + java-11-openjdk-javadoc-11.0.25.0.9-2.el8 @@ -451,6 +471,9 @@ java-11-openjdk-jmods + + java-11-openjdk-jmods-11.0.25.0-1.1 + java-11-openjdk-jmods-11.0.25.0.9-2.el8 @@ -469,6 +492,9 @@ java-11-openjdk-src + + java-11-openjdk-src-11.0.25.0-1.1 + java-11-openjdk-src-11.0.25.0.9-2.el8 @@ -1366,6 +1392,27 @@ java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 as a component of SUSE Liberty Linux 9 + + java-11-openjdk-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-demo-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-devel-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-headless-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-javadoc-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-jmods-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + + + java-11-openjdk-src-11.0.25.0-1.1 as a component of openSUSE Tumbleweed + java-11-openjdk as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -2140,51 +2187,15 @@ java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-11-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-11-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-11-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_7_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_7_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_7_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_7_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_8_0-ibm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_8_0-ibm-alsa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-ibm-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-ibm-plugin as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-1_8_0-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - java-1_8_0-openjdk-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-openjdk-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - java-1_8_0-openjdk-headless as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - java-11-openjdk as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -2914,6 +2925,13 @@ SUSE Liberty Linux 9:java-21-openjdk-static-libs-21.0.5.0.10-3.el9 SUSE Liberty Linux 9:java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 SUSE Liberty Linux 9:java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 + openSUSE Tumbleweed:java-11-openjdk-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-demo-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-devel-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-headless-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.25.0-1.1 + openSUSE Tumbleweed:java-11-openjdk-src-11.0.25.0-1.1 SUSE Linux Enterprise High Performance Computing 12 SP5:java-1_7_0-openjdk @@ -2958,9 +2976,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3-LTSS:java-1_7_0-openjdk SUSE Linux Enterprise Server Teradata 12 SP3:java-1_7_0-openjdk SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk - SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo - SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless openSUSE Leap 15.5:java-10-openjdk openSUSE Leap 15.5:java-10-openjdk-accessibility openSUSE Leap 15.5:java-10-openjdk-demo skipping CVE-2024-21147 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21145 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21144 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21140 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21138 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21131 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21096 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21094 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21085 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21068 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21012 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21011 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21005 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21004 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21003 as CVE page is older than CVRF-CVE file. skipping CVE-2024-21002 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20955 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20952 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20945 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20932 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20926 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20925 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20923 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-20506 skipping CVE-2024-20921 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20919 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20918 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20903 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20697 as CVE page is older than CVRF-CVE file. skipping CVE-2024-20696 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-20505 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-10231 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-10231 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10231.xml 2024-10-26 01:17:33.080323000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10231.xml.new 2024-10-29 01:22:41.373966000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-25T23:17:32Z + 3 + 2024-10-29T00:22:41Z current 2024-10-23T23:17:00Z - 2024-10-25T23:17:32Z + 2024-10-29T00:22:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -33,17 +33,89 @@ + https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/ + E-Mail link for openSUSE-SU-2024:0341-1 + + https://www.suse.com/support/security/rating/ SUSE Security Ratings - + + + + SUSE Package Hub 15 SP5 + + + + + SUSE Package Hub 15 SP6 + + + + + openSUSE Leap 15.5 + + + + + openSUSE Leap 15.6 + + + + chromedriver-130.0.6723.69-bp155.2.132.1 + + + chromedriver-130.0.6723.69-bp156.2.44.1 + + + chromium-130.0.6723.69-bp155.2.132.1 + + + chromium-130.0.6723.69-bp156.2.44.1 + + + chromedriver-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5 + + + chromium-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5 + + + chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6 + + + chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6 + + + chromedriver-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5 + + + chromium-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5 + + + chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6 + + + chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6 + + Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) CVE-2024-10231 - + + + SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp155.2.132.1 + SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp155.2.132.1 + SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1 + SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1 + openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp155.2.132.1 + openSUSE Leap 15.5:chromium-130.0.6723.69-bp155.2.132.1 + openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1 + openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1 + + important no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-10230 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-10230 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10230.xml 2024-10-26 01:17:33.679262000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10230.xml.new 2024-10-29 01:22:41.970928000 +0100 @@ -14,13 +14,13 @@ 1 - 3 - 2024-10-25T23:17:33Z + 4 + 2024-10-29T00:22:41Z current 2024-10-23T23:17:00Z - 2024-10-25T23:17:33Z + 2024-10-29T00:22:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -33,17 +33,89 @@ + https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/ + E-Mail link for openSUSE-SU-2024:0341-1 + + https://www.suse.com/support/security/rating/ SUSE Security Ratings - + + + + SUSE Package Hub 15 SP5 + + + + + SUSE Package Hub 15 SP6 + + + + + openSUSE Leap 15.5 + + + + + openSUSE Leap 15.6 + + + + chromedriver-130.0.6723.69-bp155.2.132.1 + + + chromedriver-130.0.6723.69-bp156.2.44.1 + + + chromium-130.0.6723.69-bp155.2.132.1 + + + chromium-130.0.6723.69-bp156.2.44.1 + + + chromedriver-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5 + + + chromium-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5 + + + chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6 + + + chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6 + + + chromedriver-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5 + + + chromium-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5 + + + chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6 + + + chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6 + + Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) CVE-2024-10230 - + + + SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp155.2.132.1 + SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp155.2.132.1 + SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1 + SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1 + openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp155.2.132.1 + openSUSE Leap 15.5:chromium-130.0.6723.69-bp155.2.132.1 + openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1 + openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1 + + important no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-10229 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-10229 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10229.xml 2024-10-26 01:17:34.241260000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-10229.xml.new 2024-10-29 01:22:42.689886000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-25T23:17:33Z + 3 + 2024-10-29T00:22:42Z current 2024-10-23T23:17:00Z - 2024-10-25T23:17:33Z + 2024-10-29T00:22:42Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -33,17 +33,89 @@ + https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/ + E-Mail link for openSUSE-SU-2024:0341-1 + + https://www.suse.com/support/security/rating/ SUSE Security Ratings - + + + + SUSE Package Hub 15 SP5 + + + + + SUSE Package Hub 15 SP6 + + + + + openSUSE Leap 15.5 + + + + + openSUSE Leap 15.6 + + + + chromedriver-130.0.6723.69-bp155.2.132.1 + + + chromedriver-130.0.6723.69-bp156.2.44.1 + + + chromium-130.0.6723.69-bp155.2.132.1 + + + chromium-130.0.6723.69-bp156.2.44.1 + + + chromedriver-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5 + + + chromium-130.0.6723.69-bp155.2.132.1 as a component of SUSE Package Hub 15 SP5 + + + chromedriver-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6 + + + chromium-130.0.6723.69-bp156.2.44.1 as a component of SUSE Package Hub 15 SP6 + + + chromedriver-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5 + + + chromium-130.0.6723.69-bp155.2.132.1 as a component of openSUSE Leap 15.5 + + + chromedriver-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6 + + + chromium-130.0.6723.69-bp156.2.44.1 as a component of openSUSE Leap 15.6 + + Inappropriate implementation in Extensions in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension. (Chromium security severity: High) CVE-2024-10229 - + + + SUSE Package Hub 15 SP5:chromedriver-130.0.6723.69-bp155.2.132.1 + SUSE Package Hub 15 SP5:chromium-130.0.6723.69-bp155.2.132.1 + SUSE Package Hub 15 SP6:chromedriver-130.0.6723.69-bp156.2.44.1 + SUSE Package Hub 15 SP6:chromium-130.0.6723.69-bp156.2.44.1 + openSUSE Leap 15.5:chromedriver-130.0.6723.69-bp155.2.132.1 + openSUSE Leap 15.5:chromium-130.0.6723.69-bp155.2.132.1 + openSUSE Leap 15.6:chromedriver-130.0.6723.69-bp156.2.44.1 + openSUSE Leap 15.6:chromium-130.0.6723.69-bp156.2.44.1 + + important no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9966 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9966 skipping CVE-2024-10041 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9954 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9954 skipping CVE-2024-9965 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9964 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9963 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9962 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9961 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9960 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9959 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9958 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9957 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9956 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9955 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9936 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9603 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9603 skipping CVE-2024-9781 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9780 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9680 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9676 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9675 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9602 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9602 No V5 entry found for CVE-2024-9370 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/9xxxx/CVE-2024-9370.json:No such file or directory no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9370 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9370 skipping CVE-2024-9407 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9403 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9402 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9401 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9400 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9399 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9398 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9397 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9396 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9395 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9394 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9393 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9392 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9391 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-9369 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/9xxxx/CVE-2024-9369.json:No such file or directory no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9369 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9369 no cpe found for SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security in CVE-2024-9287 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-9287 skipping CVE-2024-9355 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9341 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-9287.xml 2024-10-28 01:19:14.078959000 +0100 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-9287.xml.new 2024-10-29 01:22:45.590809000 +0100 @@ -14,13 +14,13 @@ 1 - 4 - 2024-10-28T00:19:13Z + 5 + 2024-10-29T00:22:45Z current 2024-10-24T23:18:11Z - 2024-10-28T00:19:13Z + 2024-10-29T00:22:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -33,6 +33,10 @@ + https://lists.suse.com/pipermail/sle-security-updates/2024-October/019680.html + E-Mail link for SUSE-SU-2024:3760-1 + + https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJFBQRJPO2RKRNCFXRZ7LBNZOD2J2TFB/ E-Mail link for openSUSE-SU-2024:14427-1 @@ -41,6 +45,10 @@ E-Mail link for openSUSE-SU-2024:14428-1 + https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYTPGEX77JK2ZE34EQ72QVIKUVEAF7IU/ + E-Mail link for openSUSE-SU-2024:14430-1 + + https://www.suse.com/support/security/rating/ SUSE Security Ratings @@ -682,6 +690,15 @@ python39-tk-3.9.20-4.1 + + libpython3_6m1_0-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1 + + + python3-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1 + + + python3-base-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1 + libpython3_6m1_0-3.6.15-6.118.1 as a component of SUSE Linux Enterprise Server 12 SP3-TERADATA @@ -772,15 +789,6 @@ python39-tk-3.9.20-4.1 as a component of openSUSE Tumbleweed - - libpython3_6m1_0-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1 - - - python3-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1 - - - python3-base-3.6.15-150000.3.164.1 as a component of SUSE Linux Enterprise Micro 5.1 - libpython3_6m1_0-3.6.15-150300.10.75.1 as a component of SUSE Linux Enterprise Micro 5.2 @@ -1159,9 +1167,6 @@ python311-tk as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS - - python3 as a component of SUSE Linux Enterprise Micro 5.1 - python3 as a component of SUSE Linux Enterprise Micro 5.2 @@ -1992,6 +1997,9 @@ CVE-2024-9287 + SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.164.1 + SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.164.1 + SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.164.1 SUSE Linux Enterprise Server 12 SP3-TERADATA:libpython3_6m1_0-3.6.15-6.118.1 SUSE Linux Enterprise Server 12 SP3-TERADATA:python36-3.6.15-6.118.1 SUSE Linux Enterprise Server 12 SP3-TERADATA:python36-base-3.6.15-6.118.1 @@ -2024,9 +2032,6 @@ openSUSE Tumbleweed:python39-tk-3.9.20-4.1 - SUSE Linux Enterprise Micro 5.1:libpython3_6m1_0-3.6.15-150000.3.164.1 - SUSE Linux Enterprise Micro 5.1:python3-3.6.15-150000.3.164.1 - SUSE Linux Enterprise Micro 5.1:python3-base-3.6.15-150000.3.164.1 SUSE Linux Enterprise Micro 5.2:libpython3_6m1_0-3.6.15-150300.10.75.1 SUSE Linux Enterprise Micro 5.2:python3-3.6.15-150300.10.75.1 SUSE Linux Enterprise Micro 5.2:python3-base-3.6.15-150300.10.75.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-9264.xml 2024-10-22 01:48:34.472811000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-9264.xml.new 2024-10-29 01:22:46.164220000 +0100 @@ -14,13 +14,13 @@ 1 - 1 - 2024-10-21T23:48:34Z + 2 + 2024-10-29T00:22:45Z current 2024-10-21T23:48:34Z - 2024-10-21T23:48:34Z + 2024-10-29T00:22:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -58,9 +58,20 @@ openSUSE Leap 15.6 + + + openSUSE Tumbleweed + + grafana + + grafana-11.3.0-1.1 + + + grafana-11.3.0-1.1 as a component of openSUSE Tumbleweed + grafana as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5 @@ -80,6 +91,9 @@ CVE-2024-9264 + + openSUSE Tumbleweed:grafana-11.3.0-1.1 + SUSE Linux Enterprise Module for Package Hub 15 SP5:grafana SUSE Linux Enterprise Module for Package Hub 15 SP6:grafana no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9122 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9122 skipping CVE-2024-9143 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9123 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-9120 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-9120 skipping CVE-2024-9121 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9026 as CVE page is older than CVRF-CVE file. skipping CVE-2024-9014 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-8928 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/8xxxx/CVE-2024-8928.json:No such file or directory skipping CVE-2024-8927 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8909 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8909 skipping CVE-2024-8925 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8908 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8908 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8907 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8907 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8906 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8906 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8905 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8905 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8904 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8904 No V5 entry found for CVE-2024-8805 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/8xxxx/CVE-2024-8805.json:No such file or directory skipping CVE-2024-8900 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8639 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8639 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-8639 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-8639 skipping CVE-2024-8645 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8638 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8638 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-8638 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-8638 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8637 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8637 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-8637 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-8637 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-8612 skipping CVE-2024-8636 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8508 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-8445 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8443 skipping CVE-2024-8394 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8389 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8388 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8387 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8386 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8385 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8384 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8383 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8382 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8381 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-8354 skipping CVE-2024-8362 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8194 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8194 skipping CVE-2024-8250 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8235 as CVE page is older than CVRF-CVE file. skipping CVE-2024-8198 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8193 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8193 skipping CVE-2024-8184 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8118.xml 2024-09-28 01:26:22.952768000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8118.xml.new 2024-10-29 01:22:58.422169000 +0100 @@ -14,13 +14,13 @@ 1 - 1 - 2024-09-27T23:26:22Z + 2 + 2024-10-29T00:22:58Z current 2024-09-27T23:26:22Z - 2024-09-27T23:26:22Z + 2024-10-29T00:22:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -58,9 +58,20 @@ openSUSE Leap 15.6 + + + openSUSE Tumbleweed + + grafana + + grafana-11.3.0-1.1 + + + grafana-11.3.0-1.1 as a component of openSUSE Tumbleweed + grafana as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5 @@ -79,7 +90,11 @@ In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write external alert instances to also write alert rules. CVE-2024-8118 - + + + openSUSE Tumbleweed:grafana-11.3.0-1.1 + + moderate no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-8096 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-8096 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8096 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-8096 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-8096 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8096.xml 2024-10-20 01:28:36.715573000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8096.xml.new 2024-10-29 01:22:59.624097000 +0100 @@ -14,13 +14,13 @@ 1 - 23 - 2024-10-19T23:28:36Z + 24 + 2024-10-29T00:22:58Z current 2024-09-11T23:19:26Z - 2024-10-19T23:28:36Z + 2024-10-29T00:22:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -324,6 +324,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP3-CHOST-BYOS-Aliyun @@ -1696,6 +1711,24 @@ libcurl4-8.0.1-11.92.1 as a component of Image SLES12-SP5-EC2-BYOS + + curl-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libcurl4-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-BYOS + + + curl-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libcurl4-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + curl-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libcurl4-8.0.1-11.92.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + curl-7.66.0-150200.4.78.1 as a component of Image SLES15-SP3-CHOST-BYOS-Aliyun @@ -2620,12 +2653,6 @@ curl as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - libcurl4 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libcurl4-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - curl as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -2803,6 +2830,12 @@ Image SLES12-SP5-Azure-SAP-BYOS:libcurl4-8.0.1-11.92.1 Image SLES12-SP5-EC2-BYOS:curl-8.0.1-11.92.1 Image SLES12-SP5-EC2-BYOS:libcurl4-8.0.1-11.92.1 + Image SLES12-SP5-GCE-BYOS:curl-8.0.1-11.92.1 + Image SLES12-SP5-GCE-BYOS:libcurl4-8.0.1-11.92.1 + Image SLES12-SP5-GCE-SAP-BYOS:curl-8.0.1-11.92.1 + Image SLES12-SP5-GCE-SAP-BYOS:libcurl4-8.0.1-11.92.1 + Image SLES12-SP5-GCE-SAP-On-Demand:curl-8.0.1-11.92.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libcurl4-8.0.1-11.92.1 Image SLES15-SP3-CHOST-BYOS-Aliyun:curl-7.66.0-150200.4.78.1 Image SLES15-SP3-CHOST-BYOS-Aliyun:libcurl4-7.66.0-150200.4.78.1 Image SLES15-SP3-CHOST-BYOS-Azure:curl-7.66.0-150200.4.78.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8088 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8088.xml 2024-10-19 01:30:41.673742000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8088.xml.new 2024-10-29 01:23:00.348103000 +0100 @@ -14,13 +14,13 @@ 1 - 16 - 2024-10-18T23:30:41Z + 17 + 2024-10-29T00:22:59Z current 2024-08-24T23:24:12Z - 2024-10-18T23:30:41Z + 2024-10-29T00:22:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -449,6 +449,11 @@ SUSE Manager Proxy 4.3 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP4 @@ -465,6 +470,21 @@ SUSE Manager Server 4.3 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + openSUSE Leap 15.5 @@ -837,6 +857,24 @@ python313-x86-64-v3-3.13.0~rc1-3.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -912,6 +950,12 @@ venv-salt-minion + + venv-salt-minion-3006.0-150000.3.67.1 + + + venv-salt-minion-3006.0-3.65.1 + libpython3_11-1_0-3.11.10-150600.3.6.1 as a component of Container bci/python:3.11.10-50.6 @@ -1896,6 +1940,24 @@ python313-x86-64-v3-3.13.0~rc1-3.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.19-8.1 as a component of openSUSE Tumbleweed @@ -1926,6 +1988,18 @@ python39-tk-3.9.19-7.1 as a component of openSUSE Tumbleweed + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3 + + + venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15 + python as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -2322,33 +2396,9 @@ python as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - python-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - python-curses as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - python-demo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - python-gdbm as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - python-idle as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - python-tk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - python3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - python3-curses as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - python3-tk as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - python36 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -2916,6 +2966,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~rc1-3.1 openSUSE Tumbleweed:python313-tk-3.13.0~rc1-3.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc1-3.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.19-8.1 openSUSE Tumbleweed:python38-curses-3.8.19-8.1 openSUSE Tumbleweed:python38-dbm-3.8.19-8.1 @@ -2927,6 +2983,12 @@ openSUSE Tumbleweed:python39-idle-3.9.19-7.1 openSUSE Tumbleweed:python39-tk-3.9.19-7.1 + + SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1 + SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Linux Enterprise High Performance Computing 12 SP5:python SUSE Linux Enterprise High Performance Computing 12 SP5:python3 @@ -3058,15 +3120,7 @@ SUSE Linux Enterprise Server Teradata 12 SP3:python36 SUSE Linux Enterprise Server Teradata 15 SP4:python3 SUSE Linux Enterprise Server for SAP Applications 12 SP5:python - SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-32bit - SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-curses - SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-demo - SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-gdbm - SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-idle - SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-tk SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3 - SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-curses - SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-tk SUSE Linux Enterprise Server for SAP Applications 12 SP5:python36 SUSE Linux Enterprise Server for SAP Applications 15 SP2:python SUSE Linux Enterprise Server for SAP Applications 15 SP2:python-curses no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8035 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8035 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8034 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8034 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-8033 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-8033 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-8006 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8006.xml 2024-10-20 01:28:38.072087000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-8006.xml.new 2024-10-29 01:23:02.055890000 +0100 @@ -14,13 +14,13 @@ 1 - 19 - 2024-10-19T23:28:37Z + 20 + 2024-10-29T00:23:01Z current 2024-09-02T23:17:14Z - 2024-10-19T23:28:37Z + 2024-10-29T00:23:01Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -79,6 +79,21 @@ Container suse/sle-micro/5.5/toolbox:13.2-3.5.37 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -962,6 +977,15 @@ libpcap1-1.10.1-150400.3.3.2 as a component of Container suse/sle-micro/5.5/toolbox:13.2-3.5.37 + + libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libpcap1-1.10.1-150400.3.3.2 as a component of Image SLES15-SP4-CHOST-BYOS @@ -1361,9 +1385,6 @@ libpcap as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - libpcap1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - libpcap as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -1434,6 +1455,9 @@ Container suse/sle-micro/5.3/toolbox:13.2-6.11.23:libpcap1-1.10.1-150400.3.3.2 Container suse/sle-micro/5.4/toolbox:13.2-5.19.24:libpcap1-1.10.1-150400.3.3.2 Container suse/sle-micro/5.5/toolbox:13.2-3.5.37:libpcap1-1.10.1-150400.3.3.2 + Image SLES12-SP5-GCE-BYOS:libpcap1-1.8.1-10.6.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpcap1-1.8.1-10.6.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpcap1-1.8.1-10.6.1 Image SLES15-SP4-CHOST-BYOS:libpcap1-1.10.1-150400.3.3.2 Image SLES15-SP4-CHOST-BYOS-Aliyun:libpcap1-1.10.1-150400.3.3.2 Image SLES15-SP4-CHOST-BYOS-Azure:libpcap1-1.10.1-150400.3.3.2 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7981 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7981 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7980 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7980 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7979 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7979 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7978 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7978 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7977 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7977 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7976 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7976 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7975 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7975 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7974 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7974 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7973 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7973 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7972 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7972 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7971 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7971 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-7971 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-7971 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7970 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7970 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7969 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7969 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7968 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7968 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7967 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7967 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7966 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7966 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7964 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7964 skipping CVE-2024-7965 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7730 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7652 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7592 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7592.xml 2024-10-26 01:17:59.412002000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7592.xml.new 2024-10-29 01:23:08.584063000 +0100 @@ -14,13 +14,13 @@ 1 - 24 - 2024-10-25T23:17:58Z + 25 + 2024-10-29T00:23:08Z current 2024-08-22T23:22:05Z - 2024-10-25T23:17:58Z + 2024-10-29T00:23:08Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -207,6 +207,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -688,6 +703,11 @@ SUSE Manager Proxy 4.3 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP4 @@ -704,6 +724,21 @@ SUSE Manager Server 4.3 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + openSUSE Leap 15.5 @@ -1394,6 +1429,24 @@ python313-x86-64-v3-3.13.0~rc2-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -1490,6 +1543,12 @@ venv-salt-minion + + venv-salt-minion-3006.0-150000.3.67.1 + + + venv-salt-minion-3006.0-3.65.1 + libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Container bci/bci-base-fips:15.6.13.2 @@ -1667,6 +1726,57 @@ python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-curses-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-curses-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3569,6 +3679,24 @@ python313-x86-64-v3-3.13.0~rc2-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python39-3.9.20-2.1 as a component of openSUSE Tumbleweed @@ -3584,6 +3712,18 @@ python39-tk-3.9.20-2.1 as a component of openSUSE Tumbleweed + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3 + + + venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15 + python as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -4132,6 +4272,23 @@ Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:python3-base-3.6.15-150300.10.72.1 Image SLES12-SP5-Azure-SAP-BYOS:libpython3_6m1_0-3.6.15-61.1 Image SLES12-SP5-Azure-SAP-BYOS:python36-base-3.6.15-61.1 + Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.139.1 + Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-61.1 + Image SLES12-SP5-GCE-BYOS:python3-3.4.10-25.139.1 + Image SLES12-SP5-GCE-BYOS:python3-base-3.4.10-25.139.1 + Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-61.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-61.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-61.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-61.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-base-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-curses-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-61.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:libpython3_6m1_0-3.6.15-150300.10.72.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-3.6.15-150300.10.72.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-base-3.6.15-150300.10.72.1 @@ -4766,12 +4923,24 @@ openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python39-3.9.20-2.1 openSUSE Tumbleweed:python39-curses-3.9.20-2.1 openSUSE Tumbleweed:python39-dbm-3.9.20-2.1 openSUSE Tumbleweed:python39-idle-3.9.20-2.1 openSUSE Tumbleweed:python39-tk-3.9.20-2.1 + + SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1 + SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1 + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7550 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7550 skipping CVE-2024-7589 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7536 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7536 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7535 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7535 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7534 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7534 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7533 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7533 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7532 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7532 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-7409 skipping CVE-2024-7531 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7530 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7529 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7528 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7527 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7526 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7525 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7524 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7523 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7522 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7521 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7520 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7519 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7518 as CVE page is older than CVRF-CVE file. skipping CVE-2024-7348 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7264 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7264.xml 2024-10-22 01:49:24.218719000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7264.xml.new 2024-10-29 01:23:15.921292000 +0100 @@ -14,13 +14,13 @@ 1 - 43 - 2024-10-21T23:49:23Z + 44 + 2024-10-29T00:23:15Z current 2024-07-31T23:17:42Z - 2024-10-21T23:49:23Z + 2024-10-29T00:23:15Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -415,6 +415,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2165,6 +2180,24 @@ libcurl4-8.0.1-11.89.1 as a component of Image SLES12-SP5-EC2-BYOS + + curl-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libcurl4-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-BYOS + + + curl-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libcurl4-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + curl-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libcurl4-8.0.1-11.89.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + curl-8.0.1-11.89.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3673,6 +3706,12 @@ Image SLES12-SP5-Azure-SAP-BYOS:libcurl4-8.0.1-11.89.1 Image SLES12-SP5-EC2-BYOS:curl-8.0.1-11.89.1 Image SLES12-SP5-EC2-BYOS:libcurl4-8.0.1-11.89.1 + Image SLES12-SP5-GCE-BYOS:curl-8.0.1-11.89.1 + Image SLES12-SP5-GCE-BYOS:libcurl4-8.0.1-11.89.1 + Image SLES12-SP5-GCE-SAP-BYOS:curl-8.0.1-11.89.1 + Image SLES12-SP5-GCE-SAP-BYOS:libcurl4-8.0.1-11.89.1 + Image SLES12-SP5-GCE-SAP-On-Demand:curl-8.0.1-11.89.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libcurl4-8.0.1-11.89.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:curl-8.0.1-11.89.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libcurl4-8.0.1-11.89.1 Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:curl-8.0.1-11.89.1 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7256 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7256 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7255 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7255 CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2024-7254 CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2024-7254: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7246.xml 2024-08-07 01:20:41.491412000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7246.xml.new 2024-10-29 01:23:17.819056000 +0100 @@ -14,13 +14,13 @@ 1 - 1 - 2024-08-06T23:20:41Z + 2 + 2024-10-29T00:23:17Z current 2024-08-06T23:20:41Z - 2024-08-06T23:20:41Z + 2024-10-29T00:23:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -229,6 +229,9 @@ grpc as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS + + grpc-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + libgrpc++1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS @@ -250,6 +253,9 @@ grpc as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS + + grpc-devel as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS + libgrpc++1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS @@ -355,6 +361,9 @@ grpc as a component of SUSE Linux Enterprise Server 15 SP3-LTSS + + grpc-devel as a component of SUSE Linux Enterprise Server 15 SP4-LTSS + libgrpc++1 as a component of SUSE Linux Enterprise Server 15 SP4-LTSS @@ -388,6 +397,9 @@ grpc as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + grpc-devel as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 + libgrpc++1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP4 @@ -545,6 +557,7 @@ SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgrpc++1 SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libgrpc8 SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:grpc + SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:grpc-devel SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1 SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60 SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60 @@ -552,6 +565,7 @@ SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc8 SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37 SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:grpc + SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:grpc-devel SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1 SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60 SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60 @@ -587,6 +601,7 @@ SUSE Linux Enterprise Server 15 SP3-LTSS:libgrpc++1 SUSE Linux Enterprise Server 15 SP3-LTSS:libgrpc8 SUSE Linux Enterprise Server 15 SP4-LTSS:grpc + SUSE Linux Enterprise Server 15 SP4-LTSS:grpc-devel SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1 SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60 SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60 @@ -598,6 +613,7 @@ SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgrpc++1 SUSE Linux Enterprise Server for SAP Applications 15 SP3:libgrpc8 SUSE Linux Enterprise Server for SAP Applications 15 SP4:grpc + SUSE Linux Enterprise Server for SAP Applications 15 SP4:grpc-devel SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1 SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60 SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7055 skipping CVE-2024-7025 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-7006 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7006.xml 2024-10-20 01:29:06.940003000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-7006.xml.new 2024-10-29 01:23:21.008888000 +0100 @@ -14,13 +14,13 @@ 1 - 15 - 2024-10-19T23:29:06Z + 16 + 2024-10-29T00:23:20Z current 2024-08-06T23:20:42Z - 2024-10-19T23:29:06Z + 2024-10-29T00:23:20Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -60,6 +60,16 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -801,6 +811,12 @@ libtiff5-4.0.9-44.86.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + libtiff5-4.0.9-44.86.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libtiff5-4.0.9-44.86.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libtiff5-4.0.9-44.86.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1194,12 +1210,6 @@ tiff as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - libtiff5 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libtiff5-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - tiff as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -1285,6 +1295,8 @@ Container suse/nginx:1.21-41.4:libtiff5-4.0.9-150000.45.47.1 Image SLES12-SP5-Azure-SAP-BYOS:libtiff5-4.0.9-44.86.1 + Image SLES12-SP5-GCE-SAP-BYOS:libtiff5-4.0.9-44.86.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libtiff5-4.0.9-44.86.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libtiff5-4.0.9-44.86.1 Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:libtiff5-4.0.9-44.86.1 Image SLES15-SP3-SAP-BYOS-Azure:libtiff5-4.0.9-150000.45.47.1 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7005 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7005 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7004 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7004 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7003 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7003 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7001 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7001 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-7000 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-7000 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6999 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6999 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6998 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6998 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6997 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6997 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6996 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6996 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6995 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6995 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6994 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6994 No V5 entry found for CVE-2024-6993 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/6xxxx/CVE-2024-6993.json:No such file or directory no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6993 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6993 No V5 entry found for CVE-2024-6992 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/6xxxx/CVE-2024-6992.json:No such file or directory no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6992 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6992 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6991 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6991 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6990 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6990 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6989 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6989 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6988 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6988 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6923 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6923.xml 2024-10-26 01:18:16.469030000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6923.xml.new 2024-10-29 01:23:26.715092000 +0100 @@ -14,13 +14,13 @@ 1 - 46 - 2024-10-25T23:18:15Z + 47 + 2024-10-29T00:23:26Z current 2024-08-05T23:18:01Z - 2024-10-25T23:18:15Z + 2024-10-29T00:23:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -254,6 +254,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -868,6 +883,11 @@ SUSE Manager Proxy 4.3 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP4 @@ -884,6 +904,21 @@ SUSE Manager Server 4.3 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + openSUSE Leap 15.5 @@ -1697,6 +1732,24 @@ python313-x86-64-v3-3.13.0~rc1-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -1808,6 +1861,12 @@ venv-salt-minion + + venv-salt-minion-3006.0-150000.3.67.1 + + + venv-salt-minion-3006.0-3.65.1 + libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Container bci/bci-base-fips:15.6.13.2 @@ -2075,6 +2134,57 @@ python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + libpython3_4m1_0-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python3-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python3-base-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libpython3_4m1_0-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-base-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-curses-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libpython3_4m1_0-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libpython3_6m1_0-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-base-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-curses-3.4.10-25.136.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python36-base-3.6.15-61.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -4340,6 +4450,24 @@ python313-x86-64-v3-3.13.0~rc1-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.19-7.1 as a component of openSUSE Tumbleweed @@ -4370,6 +4498,18 @@ python39-tk-3.9.19-6.1 as a component of openSUSE Tumbleweed + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3 + + + venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15 + python as a component of SUSE Enterprise Storage 7.1 @@ -4763,6 +4903,23 @@ Image SLES12-SP5-Azure-SAP-BYOS:python3-base-3.4.10-25.136.1 Image SLES12-SP5-Azure-SAP-BYOS:python3-curses-3.4.10-25.136.1 Image SLES12-SP5-Azure-SAP-BYOS:python36-base-3.6.15-61.1 + Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.136.1 + Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-61.1 + Image SLES12-SP5-GCE-BYOS:python3-3.4.10-25.136.1 + Image SLES12-SP5-GCE-BYOS:python3-base-3.4.10-25.136.1 + Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-61.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.136.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-61.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-3.4.10-25.136.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.136.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.136.1 + Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-61.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.136.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-61.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-3.4.10-25.136.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-base-3.4.10-25.136.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-curses-3.4.10-25.136.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-61.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:libpython3_6m1_0-3.6.15-150300.10.72.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-3.6.15-150300.10.72.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-base-3.6.15-150300.10.72.1 @@ -5518,6 +5675,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~rc1-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~rc1-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc1-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.19-7.1 openSUSE Tumbleweed:python38-curses-3.8.19-7.1 openSUSE Tumbleweed:python38-dbm-3.8.19-7.1 @@ -5529,6 +5692,12 @@ openSUSE Tumbleweed:python39-idle-3.9.19-6.1 openSUSE Tumbleweed:python39-tk-3.9.19-6.1 + + SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1 + SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Enterprise Storage 7.1:python SUSE Enterprise Storage 7.1:python-tk skipping CVE-2024-6874 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6779 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6779 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6779 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6779 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6778 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6778 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6778 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6778 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6777 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6777 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6777 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6777 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6776 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6776 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6776 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6776 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6775 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6775 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6775 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6775 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6774 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6774 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6774 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6774 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6773 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6773 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6773 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6773 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6772 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6772 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6772 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6772 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6655 skipping CVE-2024-6716 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6655.xml 2024-10-20 01:29:18.094008000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6655.xml.new 2024-10-29 01:23:31.289908000 +0100 @@ -14,13 +14,13 @@ 1 - 27 - 2024-10-19T23:29:17Z + 28 + 2024-10-29T00:23:30Z current 2024-07-12T23:18:39Z - 2024-10-19T23:29:17Z + 2024-10-29T00:23:30Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -94,6 +94,16 @@ Image SLES12-SP5-EC2-SAP-On-Demand + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1602,6 +1612,18 @@ libgtk-2_0-0-2.24.31-9.9.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand + + gtk2-tools-2.24.31-9.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libgtk-2_0-0-2.24.31-9.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gtk2-tools-2.24.31-9.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libgtk-2_0-0-2.24.31-9.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + gtk2-tools-2.24.31-9.9.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4053,48 +4075,9 @@ gtk3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP4 - - gtk2-data as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - gtk2-lang as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - gtk2-tools as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - gtk2-tools-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgtk-2_0-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgtk-2_0-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - gtk2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - gtk3-data as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - gtk3-lang as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - gtk3-tools as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - gtk3-tools-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgtk-3-0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgtk-3-0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - typelib-1_0-Gtk-3_0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - gtk3 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4240,6 +4223,10 @@ Image SLES12-SP5-EC2-SAP-BYOS:libgtk-2_0-0-2.24.31-9.9.1 Image SLES12-SP5-EC2-SAP-On-Demand:gtk2-tools-2.24.31-9.9.1 Image SLES12-SP5-EC2-SAP-On-Demand:libgtk-2_0-0-2.24.31-9.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:gtk2-tools-2.24.31-9.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:libgtk-2_0-0-2.24.31-9.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gtk2-tools-2.24.31-9.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libgtk-2_0-0-2.24.31-9.9.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gtk2-tools-2.24.31-9.9.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gtk3-data-3.20.10-17.16.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gtk3-tools-3.20.10-17.16.1 No V5 entry found for CVE-2024-6597 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/6xxxx/CVE-2024-6597.json:No such file or directory skipping CVE-2024-6615 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6614 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6613 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6612 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6611 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6610 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6609 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6608 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6607 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6606 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6605 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6604 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6603 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6602 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6601 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6600 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6519 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6505 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-6345 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6345 skipping CVE-2024-6472 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6409 as CVE page is older than CVRF-CVE file. skipping CVE-2024-6387 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6345.xml 2024-10-20 01:29:32.310656000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6345.xml.new 2024-10-29 01:23:33.627726000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-19T23:29:31Z + 37 + 2024-10-29T00:23:33Z current 2024-07-18T23:19:40Z - 2024-10-19T23:29:31Z + 2024-10-29T00:23:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -150,6 +150,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1027,6 +1042,11 @@ SUSE Manager Proxy 4.3 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP4 @@ -1043,6 +1063,21 @@ SUSE Manager Server 4.3 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + openSUSE Leap 15.5 @@ -1751,6 +1786,12 @@ venv-salt-minion + + venv-salt-minion-3006.0-150000.3.67.1 + + + venv-salt-minion-3006.0-3.65.1 + python3-setuptools-44.1.1-150400.9.9.1 as a component of Container bci/kiwi:9.24.43-10.4 @@ -1799,6 +1840,24 @@ python3-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-EC2-BYOS + + python-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python3-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + python-setuptools-40.6.2-4.24.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2867,6 +2926,18 @@ python312-setuptools-wheel-72.1.0-1.1 as a component of openSUSE Tumbleweed + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3 + + + venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15 + python-setuptools as a component of SUSE Linux Enterprise Server 12 SP4-LTSS @@ -2942,6 +3013,12 @@ Image SLES12-SP5-Azure-SAP-BYOS:python3-setuptools-40.6.2-4.24.1 Image SLES12-SP5-EC2-BYOS:python-setuptools-40.6.2-4.24.1 Image SLES12-SP5-EC2-BYOS:python3-setuptools-40.6.2-4.24.1 + Image SLES12-SP5-GCE-BYOS:python-setuptools-40.6.2-4.24.1 + Image SLES12-SP5-GCE-BYOS:python3-setuptools-40.6.2-4.24.1 + Image SLES12-SP5-GCE-SAP-BYOS:python-setuptools-40.6.2-4.24.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-setuptools-40.6.2-4.24.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python-setuptools-40.6.2-4.24.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-setuptools-40.6.2-4.24.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:python-setuptools-40.6.2-4.24.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:python3-setuptools-40.6.2-4.24.1 Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:python-setuptools-40.6.2-4.24.1 @@ -3299,6 +3376,12 @@ openSUSE Tumbleweed:python312-setuptools-72.1.0-1.1 openSUSE Tumbleweed:python312-setuptools-wheel-72.1.0-1.1 + + SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1 + SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6293 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6293 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6293 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6293 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6292 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6292 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6292 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6292 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6291 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6291 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6291 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6291 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6290 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6290 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-6290 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-6290 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6257 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6257 skipping CVE-2024-6239 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6232 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6232.xml 2024-10-26 01:18:26.067054000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-6232.xml.new 2024-10-29 01:23:37.787053000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-25T23:18:25Z + 27 + 2024-10-29T00:23:36Z current 2024-09-05T23:20:53Z - 2024-10-25T23:18:25Z + 2024-10-29T00:23:36Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -217,6 +217,21 @@ Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1515,6 +1530,24 @@ python313-x86-64-v3-3.13.0~rc2-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -1797,6 +1830,57 @@ python3-base-3.6.15-150300.10.72.1 as a component of Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45 + + libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libpython3_6m1_0-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python36-base-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libpython3_6m1_0-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-curses-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python36-base-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libpython3_4m1_0-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libpython3_6m1_0-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-base-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-curses-3.4.10-25.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python36-base-3.6.15-67.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3786,6 +3870,24 @@ python313-x86-64-v3-3.13.0~rc2-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.20-1.1 as a component of openSUSE Tumbleweed @@ -4397,6 +4499,23 @@ Container suse/sle-micro/5.5/toolbox:13.2-3.5.59:python3-base-3.6.15-150300.10.72.1 Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:libpython3_6m1_0-3.6.15-150300.10.72.1 Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:python3-base-3.6.15-150300.10.72.1 + Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.139.1 + Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-67.1 + Image SLES12-SP5-GCE-BYOS:python3-3.4.10-25.139.1 + Image SLES12-SP5-GCE-BYOS:python3-base-3.4.10-25.139.1 + Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-67.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-67.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-67.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-67.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-base-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-curses-3.4.10-25.139.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-67.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:libpython3_6m1_0-3.6.15-150300.10.72.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-3.6.15-150300.10.72.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-base-3.6.15-150300.10.72.1 @@ -5060,6 +5179,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.20-1.1 openSUSE Tumbleweed:python38-curses-3.8.20-1.1 openSUSE Tumbleweed:python38-dbm-3.8.20-1.1 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6126 skipping CVE-2024-6197 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6119 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-6104 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-6104 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6104 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6104 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6103 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6103 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6102 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6102 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6101 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6101 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-6100 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-6100 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-5953 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5953 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5953.xml 2024-09-27 01:23:31.967715000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5953.xml.new 2024-10-29 01:23:41.800836000 +0100 @@ -14,13 +14,13 @@ 1 - 17 - 2024-09-26T23:23:31Z + 18 + 2024-10-29T00:23:41Z current 2024-06-13T23:19:00Z - 2024-09-26T23:23:31Z + 2024-10-29T00:23:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -221,6 +221,12 @@ 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3 + + 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 + + + 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 + 389-ds-2.2.10~git2.345056d3-150500.3.21.1 @@ -275,6 +281,12 @@ 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3 + + 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 + + + 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 + 389-ds-devel-2.2.10~git2.345056d3-150500.3.21.1 @@ -287,6 +299,12 @@ 389-ds-snmp + + 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 + + + 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 + 389-ds-snmp-2.2.10~git2.345056d3-150500.3.21.1 @@ -305,6 +323,12 @@ lib389-2.0.20~git9.5e2d637c-150400.3.42.3 + + lib389-2.2.10~git18.20ce9289-150500.3.24.1 + + + lib389-2.2.10~git18.20ce9289-150600.8.10.1 + lib389-2.2.10~git2.345056d3-150500.3.21.1 @@ -323,6 +347,12 @@ libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3 + + libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 + + + libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 + libsvrcore0-2.2.10~git2.345056d3-150500.3.21.1 @@ -602,6 +632,60 @@ libsvrcore0-3.1.1~git0.aef1668-1.1 as a component of openSUSE Tumbleweed + + 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + 389-ds as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS @@ -759,6 +843,26 @@ openSUSE Tumbleweed:lib389-3.1.1~git0.aef1668-1.1 openSUSE Tumbleweed:libsvrcore0-3.1.1~git0.aef1668-1.1 + + SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP5:lib389-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:lib389-2.2.10~git18.20ce9289-150600.8.10.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:lib389-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:lib389-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 + no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5847 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5847 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5847 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5847 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5846 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5846 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5846 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5846 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5845 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5845 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5845 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5845 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5844 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5844 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5844 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5844 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5843 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5843 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5843 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5843 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5842 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5842 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5842 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5842 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5841 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5841 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5841 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5841 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5840 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5840 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5840 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5840 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5839 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5839 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5839 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5839 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5838 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5838 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5838 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5838 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5837 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5837 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5837 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5837 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5836 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5836 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5836 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5836 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5835 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5835 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5835 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5835 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5834 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5834 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5834 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5834 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5833 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5833 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5833 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5833 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5832 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5832 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5832 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5832 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5831 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5831 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5831 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5831 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5830 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5830 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5830 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5830 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5742 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5742 skipping CVE-2024-5702 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5701 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5700 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5699 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5698 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5697 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5696 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5695 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5694 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5693 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5692 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5691 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5690 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5688 as CVE page is older than CVRF-CVE file. skipping CVE-2024-5687 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5642 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5642.xml 2024-10-26 01:18:36.136055000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5642.xml.new 2024-10-29 01:23:49.911976000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-25T23:18:35Z + 27 + 2024-10-29T00:23:49Z current 2024-07-01T23:17:22Z - 2024-10-25T23:18:35Z + 2024-10-29T00:23:49Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -154,6 +154,21 @@ Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1327,6 +1342,24 @@ python3-base-3.6.15-150300.10.72.1 as a component of Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45 + + libpython3_6m1_0-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python36-base-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libpython3_6m1_0-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python36-base-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libpython3_6m1_0-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python36-base-3.6.15-64.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libpython3_6m1_0-3.6.15-150300.10.72.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3079,6 +3112,12 @@ Container suse/sle-micro/5.5/toolbox:13.2-3.5.59:python3-base-3.6.15-150300.10.72.1 Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:libpython3_6m1_0-3.6.15-150300.10.72.1 Container suse/sles/15.7/libguestfs-tools:1.1.1.28.45:python3-base-3.6.15-150300.10.72.1 + Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-64.1 + Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-64.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-64.1 + Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-64.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-64.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-64.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:libpython3_6m1_0-3.6.15-150300.10.72.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-3.6.15-150300.10.72.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:python3-base-3.6.15-150300.10.72.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5569 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5569.xml 2024-10-19 01:31:48.493724000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5569.xml.new 2024-10-29 01:23:51.964796000 +0100 @@ -14,13 +14,13 @@ 1 - 9 - 2024-10-18T23:31:48Z + 10 + 2024-10-29T00:23:51Z current 2024-07-09T23:18:07Z - 2024-10-18T23:31:48Z + 2024-10-29T00:23:51Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -486,6 +486,11 @@ SUSE Manager Proxy 4.3 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP4 @@ -502,6 +507,21 @@ SUSE Manager Server 4.3 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + openSUSE Leap 15.5 @@ -544,6 +564,12 @@ venv-salt-minion + + venv-salt-minion-3006.0-150000.3.67.1 + + + venv-salt-minion-3006.0-3.65.1 + python311-zipp-3.15.0-150400.10.10.1 as a component of Image SLES15-SP4-BYOS @@ -697,6 +723,18 @@ python312-zipp-3.19.2-2.1 as a component of openSUSE Tumbleweed + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3 + + + venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15 + python3-zipp as a component of SUSE Enterprise Storage 7.1 @@ -901,6 +939,12 @@ openSUSE Tumbleweed:python311-zipp-3.19.2-2.1 openSUSE Tumbleweed:python312-zipp-3.19.2-2.1 + + SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1 + SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Enterprise Storage 7.1:python-zipp SUSE Enterprise Storage 7.1:python3-zipp no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-5564 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5564 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5535 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5535.xml 2024-10-22 01:50:21.727852000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-5535.xml.new 2024-10-29 01:23:53.253209000 +0100 @@ -14,13 +14,13 @@ 1 - 58 - 2024-10-21T23:50:20Z + 59 + 2024-10-29T00:23:52Z current 2024-06-29T17:14:25Z - 2024-10-21T23:50:20Z + 2024-10-29T00:23:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -641,6 +641,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3095,6 +3110,33 @@ openssl-1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-EC2-BYOS + + libopenssl1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-BYOS + + + openssl-1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libopenssl1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + openssl-1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libopenssl1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + openssl-1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libopenssl1_0_0-1.0.2p-3.95.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -5947,6 +5989,15 @@ Image SLES12-SP5-EC2-BYOS:libopenssl1_0_0-1.0.2p-3.95.1 Image SLES12-SP5-EC2-BYOS:libopenssl1_1-1.1.1d-2.110.2 Image SLES12-SP5-EC2-BYOS:openssl-1_0_0-1.0.2p-3.95.1 + Image SLES12-SP5-GCE-BYOS:libopenssl1_0_0-1.0.2p-3.95.1 + Image SLES12-SP5-GCE-BYOS:libopenssl1_1-1.1.1d-2.110.2 + Image SLES12-SP5-GCE-BYOS:openssl-1_0_0-1.0.2p-3.95.1 + Image SLES12-SP5-GCE-SAP-BYOS:libopenssl1_0_0-1.0.2p-3.95.1 + Image SLES12-SP5-GCE-SAP-BYOS:libopenssl1_1-1.1.1d-2.110.2 + Image SLES12-SP5-GCE-SAP-BYOS:openssl-1_0_0-1.0.2p-3.95.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libopenssl1_0_0-1.0.2p-3.95.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libopenssl1_1-1.1.1d-2.110.2 + Image SLES12-SP5-GCE-SAP-On-Demand:openssl-1_0_0-1.0.2p-3.95.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libopenssl1_0_0-1.0.2p-3.95.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libopenssl1_0_0-32bit-1.0.2p-3.95.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libopenssl1_1-1.1.1d-2.110.2 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5499 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5499 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5499 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5499 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5498 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5498 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5498 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5498 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5497 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5497 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5497 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5497 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5496 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5496 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5496 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5496 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5495 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5495 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5495 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5495 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5494 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5494 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5494 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5494 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5493 no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-5493 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5493 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5493 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5458 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5458 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5274 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-5274 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-5274 skipping CVE-2024-5197 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-5171 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5160 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5159 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5158 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-5157 No V5 entry found for CVE-2024-4982 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/4xxxx/CVE-2024-4982.json:No such file or directory No V5 entry found for CVE-2024-4981 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/4xxxx/CVE-2024-4981.json:No such file or directory no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4950 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4949 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4948 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4947 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-4761 skipping CVE-2024-4855 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4854 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4853 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4778 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4777 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4776 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4775 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4774 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4773 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4772 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4771 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4770 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4769 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4768 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4767 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4766 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4765 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4764 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-4741 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/4xxxx/CVE-2024-4741.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4741 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2024-4693 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-4671 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-4671 skipping CVE-2024-4603 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4558 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4467 skipping CVE-2024-4453 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4340 skipping CVE-2024-4367 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4317 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4216 skipping CVE-2024-4141 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4076 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4068 as CVE page is older than CVRF-CVE file. skipping CVE-2024-4067 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-4032 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-4032.xml 2024-10-22 01:51:18.678708000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-4032.xml.new 2024-10-29 01:24:10.120824000 +0100 @@ -14,13 +14,13 @@ 1 - 62 - 2024-10-21T23:51:18Z + 63 + 2024-10-29T00:24:09Z current 2024-06-17T23:17:35Z - 2024-10-21T23:51:18Z + 2024-10-29T00:24:09Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1666,6 +1666,11 @@ SUSE Manager Proxy 4.3 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP4 @@ -1682,6 +1687,21 @@ SUSE Manager Server 4.3 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + openSUSE Leap 15.5 @@ -2511,6 +2531,24 @@ python313-x86-64-v3-3.13.0~rc2-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -2637,6 +2675,12 @@ python39-tools-3.9.19-150300.4.46.1 + + venv-salt-minion-3006.0-150000.3.67.1 + + + venv-salt-minion-3006.0-3.65.1 + libpython3_6m1_0-3.6.15-150300.10.65.1 as a component of Container bci/bci-base-fips:15.5.4.1 @@ -3048,9 +3092,18 @@ python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand + + libpython3_4m1_0-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-BYOS + libpython3_6m1_0-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-BYOS + + python3-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python3-base-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-BYOS + python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-BYOS @@ -3060,15 +3113,39 @@ python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-On-Demand + + libpython3_4m1_0-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + libpython3_6m1_0-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + python3-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-base-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python3-curses-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + libpython3_4m1_0-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libpython3_6m1_0-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + python3-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-base-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python3-curses-3.4.10-25.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + python36-base-3.6.15-58.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand @@ -6972,6 +7049,24 @@ python313-x86-64-v3-3.13.0~rc2-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.19-4.1 as a component of openSUSE Tumbleweed @@ -7005,6 +7100,18 @@ python39-tk-3.9.19-3.1 as a component of openSUSE Tumbleweed + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3 + + + venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15 + python as a component of SUSE Enterprise Storage 7.1 @@ -7665,13 +7772,24 @@ Image SLES12-SP5-EC2-SAP-BYOS:python36-base-3.6.15-58.1 Image SLES12-SP5-EC2-SAP-On-Demand:libpython3_6m1_0-3.6.15-58.1 Image SLES12-SP5-EC2-SAP-On-Demand:python36-base-3.6.15-58.1 + Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.133.1 Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-58.1 + Image SLES12-SP5-GCE-BYOS:python3-3.4.10-25.133.1 + Image SLES12-SP5-GCE-BYOS:python3-base-3.4.10-25.133.1 Image SLES12-SP5-GCE-BYOS:python36-base-3.6.15-58.1 Image SLES12-SP5-GCE-On-Demand:libpython3_6m1_0-3.6.15-58.1 Image SLES12-SP5-GCE-On-Demand:python36-base-3.6.15-58.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.133.1 Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-58.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-3.4.10-25.133.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.133.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.133.1 Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-58.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.133.1 Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-58.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-3.4.10-25.133.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-base-3.4.10-25.133.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-curses-3.4.10-25.133.1 Image SLES12-SP5-GCE-SAP-On-Demand:python36-base-3.6.15-58.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libpython3_4m1_0-3.4.10-25.133.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libpython3_6m1_0-3.6.15-58.1 @@ -8973,6 +9091,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~rc2-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~rc2-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~rc2-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.19-4.1 openSUSE Tumbleweed:python38-curses-3.8.19-4.1 openSUSE Tumbleweed:python38-dbm-3.8.19-4.1 @@ -8985,6 +9109,12 @@ openSUSE Tumbleweed:python39-idle-3.9.19-3.1 openSUSE Tumbleweed:python39-tk-3.9.19-3.1 + + SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1 + SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Enterprise Storage 7.1:python SUSE Enterprise Storage 7.1:python-tk --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-4030.xml 2024-10-22 01:51:19.427698000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-4030.xml.new 2024-10-29 01:24:10.981784000 +0100 @@ -14,13 +14,13 @@ 1 - 16 - 2024-10-21T23:51:19Z + 17 + 2024-10-29T00:24:10Z current 2024-06-29T17:14:45Z - 2024-10-21T23:51:19Z + 2024-10-29T00:24:10Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -610,6 +610,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -823,6 +841,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.20-1.1 as a component of openSUSE Tumbleweed @@ -1876,6 +1912,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.20-1.1 openSUSE Tumbleweed:python38-curses-3.8.20-1.1 openSUSE Tumbleweed:python38-dbm-3.8.20-1.1 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3914 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3914 skipping CVE-2024-3933 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3864 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3864 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3863 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3861 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3861 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3859 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3859 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3857 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3857 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3854 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3854 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3852 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3852 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3847 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3847 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3846 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3846 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3845 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3845 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3844 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3844 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3843 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3843 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3841 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3841 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3840 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3840 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3839 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3839 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3838 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3838 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3837 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3837 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3834 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3834 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3833 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3833 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-3832 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-3832 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3727 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-3727 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-3657 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3657 skipping CVE-2024-3708 as CVE page is older than CVRF-CVE file. skipping CVE-2024-3661 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-3657.xml 2024-09-17 01:25:13.650501000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-3657.xml.new 2024-10-29 01:24:22.018193000 +0100 @@ -14,13 +14,13 @@ 1 - 18 - 2024-09-16T23:25:13Z + 19 + 2024-10-29T00:24:21Z current 2024-05-28T23:13:43Z - 2024-09-16T23:25:13Z + 2024-10-29T00:24:21Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -218,6 +218,12 @@ 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3 + + 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 + + + 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 + 389-ds-2.2.10~git2.345056d3-150500.3.21.1 @@ -269,6 +275,12 @@ 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3 + + 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 + + + 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 + 389-ds-devel-2.2.10~git2.345056d3-150500.3.21.1 @@ -281,6 +293,12 @@ 389-ds-snmp + + 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 + + + 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 + 389-ds-snmp-2.2.10~git2.345056d3-150500.3.21.1 @@ -299,6 +317,12 @@ lib389-2.0.20~git9.5e2d637c-150400.3.42.3 + + lib389-2.2.10~git18.20ce9289-150500.3.24.1 + + + lib389-2.2.10~git18.20ce9289-150600.8.10.1 + lib389-2.2.10~git2.345056d3-150500.3.21.1 @@ -317,6 +341,12 @@ libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3 + + libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 + + + libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 + libsvrcore0-2.2.10~git2.345056d3-150500.3.21.1 @@ -605,6 +635,60 @@ libsvrcore0-3.1.1~git0.aef1668-1.1 as a component of openSUSE Tumbleweed + + 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + 389-ds as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS @@ -765,6 +849,26 @@ openSUSE Tumbleweed:lib389-3.1.1~git0.aef1668-1.1 openSUSE Tumbleweed:libsvrcore0-3.1.1~git0.aef1668-1.1 + + SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP5:lib389-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:lib389-2.2.10~git18.20ce9289-150600.8.10.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:lib389-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:lib389-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3651 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-3651.xml 2024-10-19 01:32:25.192892000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-3651.xml.new 2024-10-29 01:24:23.297129000 +0100 @@ -14,13 +14,13 @@ 1 - 56 - 2024-10-18T23:32:24Z + 57 + 2024-10-29T00:24:22Z current 2024-04-16T23:11:31Z - 2024-10-18T23:32:24Z + 2024-10-29T00:24:22Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1448,6 +1448,11 @@ SUSE Manager Proxy 4.3 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP4 @@ -1464,6 +1469,21 @@ SUSE Manager Server 4.3 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + SUSE OpenStack Cloud 8 @@ -1803,6 +1823,12 @@ venv-salt-minion + + venv-salt-minion-3006.0-150000.3.67.1 + + + venv-salt-minion-3006.0-3.65.1 + python3-idna-2.6-150000.3.3.1 as a component of Container bci/kiwi:9.24.43-8.6 @@ -2805,6 +2831,18 @@ python312-idna-3.7-1.1 as a component of openSUSE Tumbleweed + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3 + + + venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15 + python-idna as a component of HPE Helion OpenStack 8 @@ -2916,9 +2954,6 @@ python-idna as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - python3-idna as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - python2-idna as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -3347,6 +3382,12 @@ openSUSE Tumbleweed:python311-idna-3.7-1.1 openSUSE Tumbleweed:python312-idna-3.7-1.1 + + SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1 + SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Linux Enterprise Module for Basesystem 15 SP6:python-idna SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-idna skipping CVE-2024-3596 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-3447 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/3xxxx/CVE-2024-3447.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3447 skipping CVE-2024-3508 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3446 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3302 skipping CVE-2024-3219 as CVE page is older than CVRF-CVE file. skipping CVE-2024-3205 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-3177 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-3120 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-3119 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-3096 skipping CVE-2024-3094 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-2961 skipping CVE-2024-3019 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2955 as CVE page is older than CVRF-CVE file. no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2887 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-2887 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2886 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-2886 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2885 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-2885 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2883 no cpe found for openSUSE Leap 15.6 NonFree in CVE-2024-2883 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2756 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-2511 skipping CVE-2024-2616 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2615 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2614 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2613 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2612 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2611 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2610 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2609 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2608 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2607 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2606 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2605 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-2511.xml 2024-10-22 01:52:16.992661000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-2511.xml.new 2024-10-29 01:24:38.842877000 +0100 @@ -14,13 +14,13 @@ 1 - 59 - 2024-10-21T23:52:16Z + 60 + 2024-10-29T00:24:38Z current 2024-04-09T23:10:23Z - 2024-10-21T23:52:16Z + 2024-10-29T00:24:38Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -375,6 +375,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2384,6 +2399,15 @@ libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-EC2-BYOS + + libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-BYOS + + + libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libopenssl1_1-1.1.1d-2.110.2 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4948,6 +4972,9 @@ Image SLES12-SP5-Azure-BYOS:libopenssl1_1-1.1.1d-2.110.2 Image SLES12-SP5-Azure-SAP-BYOS:libopenssl1_1-1.1.1d-2.110.2 Image SLES12-SP5-EC2-BYOS:libopenssl1_1-1.1.1d-2.110.2 + Image SLES12-SP5-GCE-BYOS:libopenssl1_1-1.1.1d-2.110.2 + Image SLES12-SP5-GCE-SAP-BYOS:libopenssl1_1-1.1.1d-2.110.2 + Image SLES12-SP5-GCE-SAP-On-Demand:libopenssl1_1-1.1.1d-2.110.2 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libopenssl1_1-1.1.1d-2.110.2 Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:libopenssl1_1-1.1.1d-2.110.2 Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:libopenssl1_1-1.1.1d-150200.11.88.1 skipping CVE-2024-2496 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2494 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2466 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2400 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-2400 skipping CVE-2024-2398 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2379 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-2199 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-2199 skipping CVE-2024-2312 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2236 as CVE page is older than CVRF-CVE file. skipping CVE-2024-2201 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-2199.xml 2024-09-17 01:25:43.369460000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-2199.xml.new 2024-10-29 01:24:42.494122000 +0100 @@ -14,13 +14,13 @@ 1 - 18 - 2024-09-16T23:25:43Z + 19 + 2024-10-29T00:24:42Z current 2024-05-28T23:13:52Z - 2024-09-16T23:25:43Z + 2024-10-29T00:24:42Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -218,6 +218,12 @@ 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3 + + 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 + + + 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 + 389-ds-2.2.10~git2.345056d3-150500.3.21.1 @@ -269,6 +275,12 @@ 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3 + + 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 + + + 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 + 389-ds-devel-2.2.10~git2.345056d3-150500.3.21.1 @@ -281,6 +293,12 @@ 389-ds-snmp + + 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 + + + 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 + 389-ds-snmp-2.2.10~git2.345056d3-150500.3.21.1 @@ -299,6 +317,12 @@ lib389-2.0.20~git9.5e2d637c-150400.3.42.3 + + lib389-2.2.10~git18.20ce9289-150500.3.24.1 + + + lib389-2.2.10~git18.20ce9289-150600.8.10.1 + lib389-2.2.10~git2.345056d3-150500.3.21.1 @@ -317,6 +341,12 @@ libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3 + + libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 + + + libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 + libsvrcore0-2.2.10~git2.345056d3-150500.3.21.1 @@ -605,6 +635,60 @@ libsvrcore0-3.1.1~git0.aef1668-1.1 as a component of openSUSE Tumbleweed + + 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP5 + + + 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of SUSE Linux Enterprise Module for Server Applications 15 SP6 + + + 389-ds-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + 389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + 389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + lib389-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 as a component of openSUSE Leap 15.5 + + + 389-ds-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + 389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + 389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + lib389-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + + + libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 as a component of openSUSE Leap 15.6 + 389-ds as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS @@ -765,6 +849,26 @@ openSUSE Tumbleweed:lib389-3.1.1~git0.aef1668-1.1 openSUSE Tumbleweed:libsvrcore0-3.1.1~git0.aef1668-1.1 + + SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP5:lib389-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:lib389-2.2.10~git18.20ce9289-150600.8.10.1 + SUSE Linux Enterprise Module for Server Applications 15 SP6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.5:389-ds-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:lib389-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.5:libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 + openSUSE Leap 15.6:389-ds-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:389-ds-devel-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:389-ds-snmp-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:lib389-2.2.10~git18.20ce9289-150600.8.10.1 + openSUSE Leap 15.6:libsvrcore0-2.2.10~git18.20ce9289-150600.8.10.1 + no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2176 skipping CVE-2024-2193 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2174 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-2173 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-2044 skipping CVE-2024-2004 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-1975 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1975 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-1975 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-1975.xml 2024-10-20 01:31:02.996912000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-1975.xml.new 2024-10-29 01:24:45.428983000 +0100 @@ -14,13 +14,13 @@ 1 - 33 - 2024-10-19T23:31:02Z + 34 + 2024-10-29T00:24:44Z current 2024-07-25T23:23:59Z - 2024-10-19T23:31:02Z + 2024-10-29T00:24:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -101,6 +101,21 @@ Image SLES12-SP5-EC2-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1887,6 +1902,87 @@ python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS + + bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4068,42 +4164,6 @@ bind as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - bind-chrootenv as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - bind-doc as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - bind-utils as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libbind9-161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libdns1110 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libirs161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libisc1107 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libisc1107-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libisccc161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libisccfg163 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - liblwres161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - python-bind as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - @@ -4151,6 +4211,33 @@ Image SLES12-SP5-EC2-SAP-BYOS:libisccfg163-9.11.22-3.57.1 Image SLES12-SP5-EC2-SAP-BYOS:liblwres161-9.11.22-3.57.1 Image SLES12-SP5-EC2-SAP-BYOS:python-bind-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:bind-utils-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libbind9-161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libdns1110-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libirs161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libisc1107-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libisccc161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libisccfg163-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:liblwres161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:python-bind-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:bind-utils-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libbind9-161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libdns1110-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libirs161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libisc1107-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libisccc161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libisccfg163-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:liblwres161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:python-bind-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:bind-utils-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libbind9-161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libdns1110-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libirs161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libisc1107-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libisccc161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libisccfg163-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:liblwres161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python-bind-9.11.22-3.57.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:bind-utils-9.11.22-3.57.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libbind9-161-9.11.22-3.57.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libdns1110-9.11.22-3.57.1 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-1936 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1753 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2024-1737 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1737 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-1737 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-1737.xml 2024-10-20 01:31:06.640752000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-1737.xml.new 2024-10-29 01:24:49.341855000 +0100 @@ -14,13 +14,13 @@ 1 - 32 - 2024-10-19T23:31:06Z + 33 + 2024-10-29T00:24:48Z current 2024-07-25T23:24:01Z - 2024-10-19T23:31:06Z + 2024-10-29T00:24:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -101,6 +101,21 @@ Image SLES12-SP5-EC2-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1871,6 +1886,87 @@ python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS + + bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-BYOS + + + bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libbind9-161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libdns1110-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libirs161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libisc1107-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libisccc161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libisccfg163-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + liblwres161-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + python-bind-9.11.22-3.57.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + bind-utils-9.11.22-3.57.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3995,42 +4091,6 @@ bind as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - bind-chrootenv as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - bind-doc as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - bind-utils as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libbind9-161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libdns1110 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libirs161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libisc1107 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libisc1107-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libisccc161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libisccfg163 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - liblwres161 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - python-bind as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - @@ -4078,6 +4138,33 @@ Image SLES12-SP5-EC2-SAP-BYOS:libisccfg163-9.11.22-3.57.1 Image SLES12-SP5-EC2-SAP-BYOS:liblwres161-9.11.22-3.57.1 Image SLES12-SP5-EC2-SAP-BYOS:python-bind-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:bind-utils-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libbind9-161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libdns1110-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libirs161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libisc1107-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libisccc161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:libisccfg163-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:liblwres161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-BYOS:python-bind-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:bind-utils-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libbind9-161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libdns1110-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libirs161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libisc1107-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libisccc161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:libisccfg163-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:liblwres161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-BYOS:python-bind-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:bind-utils-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libbind9-161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libdns1110-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libirs161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libisc1107-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libisccc161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libisccfg163-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:liblwres161-9.11.22-3.57.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python-bind-9.11.22-3.57.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:bind-utils-9.11.22-3.57.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libbind9-161-9.11.22-3.57.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:libdns1110-9.11.22-3.57.1 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1676 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1675 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1674 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1673 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1672 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1671 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1670 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-1669 No V5 entry found for CVE-2024-1627 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/1xxxx/CVE-2024-1627.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1597 skipping CVE-2024-1557 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1556 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1555 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1554 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1553 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1552 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1551 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1550 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1549 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1548 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1547 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1546 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1441 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2024-1313 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2024-1313 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1284 skipping CVE-2024-1312 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1305 as CVE page is older than CVRF-CVE file. skipping CVE-2024-1298 as CVE page is older than CVRF-CVE file. no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1283 No V5 entry found for CVE-2024-1271 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/1xxxx/CVE-2024-1271.json:No such file or directory skipping CVE-2024-1151 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1135 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1086 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1077 skipping CVE-2024-1085 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-1062 skipping CVE-2024-1065 as CVE page is older than CVRF-CVE file. no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1060 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-1059 skipping CVE-2024-1048 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0985 skipping CVE-2024-1013 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0914 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP6 in CVE-2024-0874 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0841 skipping CVE-2024-0853 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2024-0793 / /home/securitybot/prod/cve-database/cvelistV5/cves/2024/0xxxx/CVE-2024-0793.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0793 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0775 CVE-2024-0690: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2024-0690: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2024-0690: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2024-0690: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2024-0690: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2024-0690: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2024-0690: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2024-0690: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2024-0690: no packages for SUSE Manager Tools for SLE Micro 5, but entry? skipping CVE-2024-0760 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0755 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0754 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0753 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0752 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0751 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0750 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0749 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0748 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0747 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0746 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0745 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0744 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0743 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0742 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0741 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0727 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0519 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0519 skipping CVE-2024-0684 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0671 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0646 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0641 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0639 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0607 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0584 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0582 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0567 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0565 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0564 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0562 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0553 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0518 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0518 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0517 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0517 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0397 skipping CVE-2024-0450 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0444 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0443 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0409 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0408 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-0397.xml 2024-10-22 01:53:40.977741000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2024-0397.xml.new 2024-10-29 01:25:07.842841000 +0100 @@ -14,13 +14,13 @@ 1 - 56 - 2024-10-21T23:53:40Z + 57 + 2024-10-29T00:25:07Z current 2024-06-17T23:18:37Z - 2024-10-21T23:53:40Z + 2024-10-29T00:25:07Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1640,6 +1640,11 @@ SUSE Manager Proxy 4.3 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP4 @@ -1656,6 +1661,21 @@ SUSE Manager Server 4.3 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + openSUSE Leap 15.5 @@ -2371,6 +2391,12 @@ python39-tools-3.9.19-150300.4.46.1 + + venv-salt-minion-3006.0-150000.3.67.1 + + + venv-salt-minion-3006.0-3.65.1 + libpython3_6m1_0-3.6.15-150300.10.65.1 as a component of Container bci/bci-base-fips:15.5.4.1 @@ -5884,6 +5910,18 @@ python39-tk-3.9.19-2.1 as a component of openSUSE Tumbleweed + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Proxy Module 4.3 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Server Module 4.3 + + + venv-salt-minion-3006.0-3.65.1 as a component of SUSE Manager Tools 12 + + + venv-salt-minion-3006.0-150000.3.67.1 as a component of SUSE Manager Tools 15 + python as a component of SUSE Enterprise Storage 7.1 @@ -7687,6 +7725,12 @@ openSUSE Tumbleweed:python39-idle-3.9.19-2.1 openSUSE Tumbleweed:python39-tk-3.9.19-2.1 + + SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Manager Tools 12:venv-salt-minion-3006.0-3.65.1 + SUSE Manager Tools 15:venv-salt-minion-3006.0-150000.3.67.1 + SUSE Enterprise Storage 7.1:python SUSE Enterprise Storage 7.1:python-tk no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0333 skipping CVE-2024-0340 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0225 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0225 skipping CVE-2024-0232 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0229 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0224 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0224 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0223 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0223 no cpe found for SUSE Package Hub 15 SP5 in CVE-2024-0222 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2024-0222 skipping CVE-2024-0217 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0211 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0210 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0209 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0208 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0207 as CVE page is older than CVRF-CVE file. skipping CVE-2024-0193 as CVE page is older than CVRF-CVE file. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. Use of uninitialized value $mtime in numeric lt (<) at bin/generate-cvrf-cve.pl line 162. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0092 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0091 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0090 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0075 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2024-0074 no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2023-52915 skipping CVE-2023-52916 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52915.xml 2024-10-16 01:35:33.450363000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52915.xml.new 2024-10-29 01:25:16.537102000 +0100 @@ -14,13 +14,13 @@ 1 - 9 - 2024-10-15T23:35:32Z + 10 + 2024-10-29T00:25:15Z current 2024-09-06T23:27:25Z - 2024-10-15T23:35:32Z + 2024-10-29T00:25:15Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -88,6 +88,21 @@ Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + SUSE Linux Enterprise Module for Basesystem 15 SP5 @@ -425,6 +440,253 @@ openSUSE Leap 15.6 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + cluster-md-kmp-64kb-6.4.0-150600.23.25.1 @@ -953,6 +1215,39 @@ kernel-default-6.4.0-150600.23.25.1 as a component of Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.231.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 @@ -2133,6 +2428,17 @@ Container bci/bci-sle15-kernel-module-devel:15.6.27.8:kernel-macros-6.4.0-150600.23.25.1 Container bci/bci-sle15-kernel-module-devel:15.6.27.8:kernel-syms-6.4.0-150600.23.25.1 Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.49:kernel-default-6.4.0-150600.23.25.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.231.1 SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.231.1 @@ -2345,6 +2651,229 @@ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52907 skipping CVE-2023-52914 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52913 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52912 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52911 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52910 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52909 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52908 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52907.xml 2024-10-20 01:31:59.738954000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52907.xml.new 2024-10-29 01:25:17.361018000 +0100 @@ -14,13 +14,13 @@ 1 - 25 - 2024-10-19T23:31:59Z + 26 + 2024-10-29T00:25:16Z current 2024-08-21T23:28:15Z - 2024-10-19T23:31:59Z + 2024-10-29T00:25:16Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -125,6 +125,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1386,6 +1401,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2827,6 +2875,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52901 skipping CVE-2023-52906 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52905 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52904 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52903 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52902 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52901.xml 2024-10-20 01:32:02.786824000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52901.xml.new 2024-10-29 01:25:18.090797000 +0100 @@ -14,13 +14,13 @@ 1 - 22 - 2024-10-19T23:32:02Z + 23 + 2024-10-29T00:25:17Z current 2024-08-21T23:28:16Z - 2024-10-19T23:32:02Z + 2024-10-29T00:25:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -132,6 +132,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1393,6 +1408,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2692,18 +2740,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -2859,6 +2895,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 @@ -3227,10 +3274,6 @@ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source openSUSE Leap 15.6:cluster-md-kmp-default openSUSE Leap 15.6:dlm-kmp-default no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52893 skipping CVE-2023-52900 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52899 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52898 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52897 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52896 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52895 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52894 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52893.xml 2024-10-20 01:32:07.176585000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52893.xml.new 2024-10-29 01:25:18.813714000 +0100 @@ -14,13 +14,13 @@ 1 - 23 - 2024-10-19T23:32:06Z + 24 + 2024-10-29T00:25:18Z current 2024-08-21T23:28:19Z - 2024-10-19T23:32:06Z + 2024-10-29T00:25:18Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1370,6 +1385,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2795,6 +2843,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52885 skipping CVE-2023-52889 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52888 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52887 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52886 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52885.xml 2024-10-20 01:32:10.032895000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52885.xml.new 2024-10-29 01:25:20.012180000 +0100 @@ -14,13 +14,13 @@ 1 - 39 - 2024-10-19T23:32:09Z + 40 + 2024-10-29T00:25:19Z current 2024-07-15T23:16:11Z - 2024-10-19T23:32:09Z + 2024-10-29T00:25:19Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -230,6 +230,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2443,6 +2458,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4996,18 +5044,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -5121,6 +5157,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 @@ -5944,10 +5991,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52881 skipping CVE-2023-52884 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52883 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52882 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52880 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52865 skipping CVE-2023-52879 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52878 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52877 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52876 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52875 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52874 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52873 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52872 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52871 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52870 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52869 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52868 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52867 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52866 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52846 skipping CVE-2023-52864 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52863 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52862 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52861 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52860 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52859 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52858 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52857 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52856 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52855 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52854 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52853 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52852 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52851 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52850 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52849 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52848 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52847 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52846.xml 2024-10-22 01:54:51.558569000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52846.xml.new 2024-10-29 01:25:22.588015000 +0100 @@ -14,13 +14,13 @@ 1 - 62 - 2024-10-21T23:54:50Z + 63 + 2024-10-29T00:25:22Z current 2024-05-23T23:14:05Z - 2024-10-21T23:54:50Z + 2024-10-29T00:25:22Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2273,21 +2273,36 @@ kernel-livepatch-5_14_21-150400_24_103-default-9-150400.2.2 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-6-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_122-default-4-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1 @@ -2321,24 +2336,42 @@ kernel-livepatch-5_14_21-150500_13_30-rt-10-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_52-rt-5-150500.11.8.1 + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_55-rt-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_58-rt-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1 @@ -2360,30 +2393,51 @@ kernel-livepatch-5_14_21-150500_55_44-default-10-150500.2.2 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_65-default-5-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_68-default-4-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 kernel-livepatch-6_4_0-150600_21-default-5-150600.1.1 + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + kernel-livepatch-6_4_0-150600_23_14-default-1-150600.13.3.2 @@ -4877,6 +4931,60 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -6079,6 +6187,26 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel skipping CVE-2023-52844 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52842 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52841 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52840 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52839 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52838 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52837 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52836 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52834 skipping CVE-2023-52833 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52832 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52831 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52829 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52828 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52827 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52826 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52825 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52823 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52821 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52818 skipping CVE-2023-52819 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52817 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52816 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52815 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52814 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52813 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52812 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52811 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52810 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52809 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52808 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52807 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52806 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52805 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52804 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52803 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52802 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52801 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52800 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52799 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52798 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52797 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52796 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52795 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52794 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52792 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52791 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52790 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52789 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52788 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52787 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52786 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52785 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52766 skipping CVE-2023-52783 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52782 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52781 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52780 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52779 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52778 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52777 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52776 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52775 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52774 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52773 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52772 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52771 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52770 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52769 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52768 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52767 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52766.xml 2024-10-20 01:33:03.272625000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52766.xml.new 2024-10-29 01:25:28.465764000 +0100 @@ -14,13 +14,13 @@ 1 - 58 - 2024-10-19T23:33:02Z + 59 + 2024-10-29T00:25:27Z current 2024-06-07T23:16:39Z - 2024-10-19T23:33:02Z + 2024-10-29T00:25:27Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -5110,24 +5110,9 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -6100,11 +6085,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default skipping CVE-2023-52765 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52764 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52763 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52762 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52761 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52760 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52759 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52756 skipping CVE-2023-52757 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52754 skipping CVE-2023-52755 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for Confidential Computing Technical Preview 15 SP6 in CVE-2023-52752 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52752 skipping CVE-2023-52753 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52752.xml 2024-10-22 01:56:06.361728000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52752.xml.new 2024-10-29 01:25:31.926038000 +0100 @@ -14,13 +14,13 @@ 1 - 55 - 2024-10-21T23:56:05Z + 56 + 2024-10-29T00:25:30Z current 2024-05-28T23:14:37Z - 2024-10-21T23:56:05Z + 2024-10-29T00:25:30Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2264,27 +2264,204 @@ kernel-kvmsmall-vdso-6.4.0-150600.23.25.1 + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_125-default-1-150400.9.3.1 + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_61-rt-1-150500.11.3.1 + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1 + + kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1 + + kernel-livepatch-6_4_0-150600_10_11-rt-2-150600.2.1 + kernel-livepatch-6_4_0-150600_10_14-rt-1-150600.1.3.1 + + kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 + + + kernel-livepatch-6_4_0-150600_10_8-rt-2-150600.1.6.1 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + + + kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 + + + kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 + + + kernel-livepatch-6_4_0-150600_23_22-default-2-150600.13.6.1 + kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1 + + kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 + + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + kernel-macros @@ -2576,6 +2753,30 @@ kernel-zfcpdump-6.4.0-150600.23.25.1 + + kgraft-patch-4_12_14-122_179-default-14-2.1 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 + kgraft-patch-4_12_14-122_222-default-1-8.3.1 @@ -3998,6 +4199,9 @@ kernel-default-livepatch-devel-6.4.0-150600.23.25.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + kernel-livepatch-6_4_0-150600_10_11-rt-2-150600.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-livepatch-6_4_0-150600_10_14-rt-1-150600.1.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 @@ -5417,6 +5621,204 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_179-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_183-default-14-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_186-default-13-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_189-default-12-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_194-default-10-2.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_219-default-4-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_10_8-rt-2-150600.1.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_22-default-2-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + + + kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 as a component of SUSE Linux Enterprise Live Patching 15 SP6 + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -6077,6 +6479,7 @@ SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.25.1 SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.25.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_11-rt-2-150600.2.1 SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_14-rt-1-150600.1.3.1 SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1 SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1 @@ -6551,6 +6954,74 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_179-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_183-default-14-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_186-default-13-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_189-default-12-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_194-default-10-2.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_219-default-4-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_5-rt-4-150600.1.8.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_10_8-rt-2-150600.1.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_22-default-2-150600.13.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_8-rt-5-150600.3.1 + SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52743 skipping CVE-2023-52751 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52750 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52749 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52748 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52747 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52746 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52745 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52744 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52743.xml 2024-10-22 01:56:14.660764000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52743.xml.new 2024-10-29 01:25:32.718013000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-21T23:56:14Z + 41 + 2024-10-29T00:25:32Z current 2024-05-22T23:14:28Z - 2024-10-21T23:56:14Z + 2024-10-29T00:25:32Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -171,6 +171,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1965,6 +1980,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4035,6 +4083,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2023-52742 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52741 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52740 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52739 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52738 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52737 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52736 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52735 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52733 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52732 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52731 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52730 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52708 skipping CVE-2023-52722 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52708.xml 2024-10-17 01:27:34.694698000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52708.xml.new 2024-10-29 01:25:34.116973000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-16T23:27:34Z + 38 + 2024-10-29T00:25:33Z current 2024-05-28T23:14:42Z - 2024-10-16T23:27:34Z + 2024-10-29T00:25:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -109,6 +109,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-BYOS @@ -1902,6 +1917,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.122.2 as a component of Image SLES15-SP4-BYOS @@ -3939,6 +3987,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-BYOS:kernel-default-5.14.21-150400.24.122.2 Image SLES15-SP4-BYOS-Azure:kernel-default-5.14.21-150400.24.122.2 Image SLES15-SP4-BYOS-EC2:kernel-default-5.14.21-150400.24.122.2 skipping CVE-2023-52707 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52706 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52705 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52704 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52703 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52702 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52701 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52700 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52699 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52697 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52696 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52695 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52694 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52692 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52690 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52689 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52688 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52687 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52686 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52685 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52684 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52682 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52681 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52680 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52679 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52678 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52676 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52674 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52673 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52672 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52671 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52670 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52669.xml 2024-10-16 01:37:23.596568000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52669.xml.new 2024-10-29 01:25:40.109150000 +0100 @@ -14,13 +14,13 @@ 1 - 56 - 2024-10-15T23:37:23Z + 57 + 2024-10-29T00:25:39Z current 2024-05-20T23:12:52Z - 2024-10-15T23:37:23Z + 2024-10-29T00:25:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -171,6 +171,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2273,6 +2288,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4590,6 +4638,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2023-52668 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52667 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52665 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52664 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52663 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52662 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52661 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52660 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52659 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52658 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52657 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52656 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52655 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52654 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52653 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52651 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52650 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52649 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52648 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52647 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52646 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52645 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52643 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52642 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52641 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52640 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52639 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52638 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52637 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52636 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52634 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52633 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52632 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52631 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52630 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52629 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52628 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52627 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52626 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52625 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52624 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52623.xml 2024-10-17 01:28:00.199842000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52623.xml.new 2024-10-29 01:25:44.024941000 +0100 @@ -14,13 +14,13 @@ 1 - 53 - 2024-10-16T23:27:59Z + 54 + 2024-10-29T00:25:43Z current 2024-03-28T00:12:09Z - 2024-10-16T23:27:59Z + 2024-10-29T00:25:43Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -169,6 +169,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1633,6 +1648,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3332,6 +3380,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2023-52621 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52620 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52619.xml 2024-10-16 01:37:42.040609000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52619.xml.new 2024-10-29 01:25:45.211875000 +0100 @@ -14,13 +14,13 @@ 1 - 54 - 2024-10-15T23:37:41Z + 55 + 2024-10-29T00:25:44Z current 2024-03-19T00:10:20Z - 2024-10-15T23:37:41Z + 2024-10-29T00:25:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -123,6 +123,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1584,6 +1599,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3213,6 +3261,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2023-52618 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52617 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52616 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52615.xml 2024-10-16 01:37:44.729437000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52615.xml.new 2024-10-29 01:25:46.188818000 +0100 @@ -14,13 +14,13 @@ 1 - 55 - 2024-10-15T23:37:44Z + 56 + 2024-10-29T00:25:45Z current 2024-03-19T00:10:21Z - 2024-10-15T23:37:44Z + 2024-10-29T00:25:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -117,6 +117,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1602,6 +1617,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3264,6 +3312,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2023-52613 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52612.xml 2024-10-16 01:37:45.811371000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52612.xml.new 2024-10-29 01:25:47.448737000 +0100 @@ -14,13 +14,13 @@ 1 - 55 - 2024-10-15T23:37:45Z + 56 + 2024-10-29T00:25:46Z current 2024-03-19T00:10:21Z - 2024-10-15T23:37:45Z + 2024-10-29T00:25:46Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -113,6 +113,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1533,6 +1548,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3131,6 +3179,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52607 skipping CVE-2023-52611 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52610 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52609 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52608 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52597 skipping CVE-2023-52606 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52605 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52604 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52603 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52602 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52601 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52600 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52599 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52598 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52596 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52595 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52594.xml 2024-10-17 01:28:06.304528000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52594.xml.new 2024-10-29 01:25:49.270137000 +0100 @@ -14,13 +14,13 @@ 1 - 56 - 2024-10-16T23:28:05Z + 57 + 2024-10-29T00:25:48Z current 2024-03-07T00:11:40Z - 2024-10-16T23:28:05Z + 2024-10-29T00:25:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -129,6 +129,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1614,6 +1629,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3288,6 +3336,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2023-52593 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52591 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52590 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52589 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52588 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52587 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52586 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52585 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52584 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52583 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52582 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52581 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52580 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52579 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52578 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52577 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52576 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52575 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52574 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52573 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52571 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52570 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52569 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52568 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52567 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52566 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52565 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52564 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52563 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52562 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52561 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52560 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52559 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52532 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52531 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52530 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52529 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52528 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52524 skipping CVE-2023-52526 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52525 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52523 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52522 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52521 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52520 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52519 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52518 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52517 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52516 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52515 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52502 skipping CVE-2023-52513 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52512 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52511 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52510 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52509 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52508 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52507 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52506 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52505 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52504 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52503 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52502.xml 2024-10-17 01:28:16.169576000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52502.xml.new 2024-10-29 01:25:54.592920000 +0100 @@ -14,13 +14,13 @@ 1 - 84 - 2024-10-16T23:28:15Z + 85 + 2024-10-29T00:25:53Z current 2024-03-05T00:10:21Z - 2024-10-16T23:28:15Z + 2024-10-29T00:25:53Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2270,12 +2270,18 @@ kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-1-150400.9.5.1 @@ -2327,12 +2333,18 @@ kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-1-150500.11.3.1 @@ -2363,12 +2375,18 @@ kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-1-150500.11.7.1 @@ -5240,6 +5258,24 @@ kernel-rt-5.14.21-150500.13.47.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6 @@ -6367,6 +6403,14 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.47.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-default SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch skipping CVE-2023-52501 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52500 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52499 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52498 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52497 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52496 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52495 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52494 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52493 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52492 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52491 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52490 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52489 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52488 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52487 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52486 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52485 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52484 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52483 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52482 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52481 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52480 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52479 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52478 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52477 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52476 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52475 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52474 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52473 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52472 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52471 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52470 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52469 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52468 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52467 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52466 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52465 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52464 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52463 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52462 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52461 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52460 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52459 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52458 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52457 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52456 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52455 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52454 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52453 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52452 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52451 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52450 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52449 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52448 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52447 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52446 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52445 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52444 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52443 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52442 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52441 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52440 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52439 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52438 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52436 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52435.xml 2024-10-16 01:38:19.503606000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52435.xml.new 2024-10-29 01:25:56.768743000 +0100 @@ -14,13 +14,13 @@ 1 - 50 - 2024-10-15T23:38:18Z + 51 + 2024-10-29T00:25:56Z current 2024-02-22T00:10:02Z - 2024-10-15T23:38:18Z + 2024-10-29T00:25:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -239,6 +239,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2260,6 +2275,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4657,6 +4705,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52425 skipping CVE-2023-52434 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52433 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52429 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52426 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52425.xml 2024-10-27 01:19:41.266016000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52425.xml.new 2024-10-29 01:25:57.548223000 +0100 @@ -14,13 +14,13 @@ 1 - 111 - 2024-10-26T23:19:40Z + 112 + 2024-10-29T00:25:56Z current 2024-02-06T00:09:50Z - 2024-10-26T23:19:40Z + 2024-10-29T00:25:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2766,6 +2766,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -3726,6 +3744,12 @@ python36-base-3.6.15-55.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand + + expat-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libexpat1-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-BYOS + libpython2_7-1_0-2.7.18-33.32.1 as a component of Image SLES12-SP5-GCE-BYOS @@ -3780,6 +3804,12 @@ python36-base-3.6.15-55.1 as a component of Image SLES12-SP5-GCE-On-Demand + + expat-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libexpat1-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + libpython2_7-1_0-2.7.18-33.32.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS @@ -3810,6 +3840,12 @@ python36-base-3.6.15-55.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + expat-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libexpat1-2.1.0-21.32.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libpython2_7-1_0-2.7.18-33.32.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand @@ -9237,6 +9273,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.19-1.1 as a component of openSUSE Tumbleweed @@ -10087,6 +10141,8 @@ Image SLES12-SP5-EC2-SAP-On-Demand:python3-base-3.4.10-25.127.1 Image SLES12-SP5-EC2-SAP-On-Demand:python3-curses-3.4.10-25.127.1 Image SLES12-SP5-EC2-SAP-On-Demand:python36-base-3.6.15-55.1 + Image SLES12-SP5-GCE-BYOS:expat-2.1.0-21.32.1 + Image SLES12-SP5-GCE-BYOS:libexpat1-2.1.0-21.32.1 Image SLES12-SP5-GCE-BYOS:libpython2_7-1_0-2.7.18-33.32.1 Image SLES12-SP5-GCE-BYOS:libpython3_4m1_0-3.4.10-25.127.1 Image SLES12-SP5-GCE-BYOS:libpython3_6m1_0-3.6.15-55.1 @@ -10105,6 +10161,8 @@ Image SLES12-SP5-GCE-On-Demand:python3-3.4.10-25.127.1 Image SLES12-SP5-GCE-On-Demand:python3-base-3.4.10-25.127.1 Image SLES12-SP5-GCE-On-Demand:python36-base-3.6.15-55.1 + Image SLES12-SP5-GCE-SAP-BYOS:expat-2.1.0-21.32.1 + Image SLES12-SP5-GCE-SAP-BYOS:libexpat1-2.1.0-21.32.1 Image SLES12-SP5-GCE-SAP-BYOS:libpython2_7-1_0-2.7.18-33.32.1 Image SLES12-SP5-GCE-SAP-BYOS:libpython3_4m1_0-3.4.10-25.127.1 Image SLES12-SP5-GCE-SAP-BYOS:libpython3_6m1_0-3.6.15-55.1 @@ -10115,6 +10173,8 @@ Image SLES12-SP5-GCE-SAP-BYOS:python3-base-3.4.10-25.127.1 Image SLES12-SP5-GCE-SAP-BYOS:python3-curses-3.4.10-25.127.1 Image SLES12-SP5-GCE-SAP-BYOS:python36-base-3.6.15-55.1 + Image SLES12-SP5-GCE-SAP-On-Demand:expat-2.1.0-21.32.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libexpat1-2.1.0-21.32.1 Image SLES12-SP5-GCE-SAP-On-Demand:libpython2_7-1_0-2.7.18-33.32.1 Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_4m1_0-3.4.10-25.127.1 Image SLES12-SP5-GCE-SAP-On-Demand:libpython3_6m1_0-3.6.15-55.1 @@ -11955,6 +12015,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.19-1.1 openSUSE Tumbleweed:python38-curses-3.8.19-1.1 openSUSE Tumbleweed:python38-dbm-3.8.19-1.1 skipping CVE-2023-52424 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52356 as CVE page is older than CVRF-CVE file. skipping CVE-2023-52355 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52340 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52340.xml 2024-10-22 02:00:24.755583000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-52340.xml.new 2024-10-29 01:25:59.577086000 +0100 @@ -14,13 +14,13 @@ 1 - 84 - 2024-10-22T00:00:24Z + 85 + 2024-10-29T00:25:58Z current 2024-01-30T00:09:33Z - 2024-10-22T00:00:24Z + 2024-10-29T00:25:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2308,6 +2308,9 @@ kernel-livepatch-5_14_21-150400_24_103-default-3-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 @@ -2365,6 +2368,9 @@ kernel-livepatch-5_14_21-150500_13_30-rt-4-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 @@ -2398,6 +2404,9 @@ kernel-livepatch-5_14_21-150500_55_44-default-4-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 @@ -5452,6 +5461,15 @@ kernel-rt-5.14.21-150500.13.38.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE CaaS Platform 4.0 @@ -6734,6 +6752,11 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.38.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE CaaS Platform 4.0:kernel-default SUSE CaaS Platform 4.0:kernel-default-base no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52323 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52169 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52168 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-52160 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51798 skipping CVE-2023-52071 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51794 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51793 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51780 skipping CVE-2023-51782 as CVE page is older than CVRF-CVE file. skipping CVE-2023-51781 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51779 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-51766 skipping CVE-2023-51767 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51764 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-51713 skipping CVE-2023-51714 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-51448 skipping CVE-2023-51385 as CVE page is older than CVRF-CVE file. skipping CVE-2023-51384 as CVE page is older than CVRF-CVE file. skipping CVE-2023-51257 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51043 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-51042 no cpe found for SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security in CVE-2023-50782 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50782 skipping CVE-2023-50868 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-50782.xml 2024-10-26 01:20:30.973028000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-50782.xml.new 2024-10-29 01:26:19.214125000 +0100 @@ -14,13 +14,13 @@ 1 - 15 - 2024-10-25T23:20:30Z + 16 + 2024-10-29T00:26:18Z current 2023-12-15T00:08:42Z - 2024-10-25T23:20:30Z + 2024-10-29T00:26:18Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -51,6 +51,21 @@ HPE Helion OpenStack 8 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + SUSE CaaS Platform 4.0 @@ -579,6 +594,253 @@ openSUSE Tumbleweed + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + compat-openssl098 @@ -900,6 +1162,15 @@ python311-cryptography + + libopenssl1_1-1.1.1d-2.113.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libopenssl1_1-1.1.1d-2.113.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libopenssl1_1-1.1.1d-2.113.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libopenssl1_1-1.1.1d-2.113.1 as a component of SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security @@ -3188,6 +3459,9 @@ CVE-2023-50782 + Image SLES12-SP5-GCE-BYOS:libopenssl1_1-1.1.1d-2.113.1 + Image SLES12-SP5-GCE-SAP-BYOS:libopenssl1_1-1.1.1d-2.113.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libopenssl1_1-1.1.1d-2.113.1 SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security:libopenssl1_1-1.1.1d-2.113.1 SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security:libopenssl1_1-32bit-1.1.1d-2.113.1 SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security:libopenssl1_1-hmac-1.1.1d-2.113.1 @@ -3595,6 +3869,229 @@ openSUSE Leap 15.6:python3-cryptography openSUSE Leap 15.6:python311-cryptography + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + skipping CVE-2023-50781 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50711 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50472 skipping CVE-2023-50495 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50471 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-50447 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50447 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50447 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-50269 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50269 skipping CVE-2023-50431 as CVE page is older than CVRF-CVE file. skipping CVE-2023-50387 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-50255 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50255 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-50250 skipping CVE-2023-50230 as CVE page is older than CVRF-CVE file. skipping CVE-2023-50229 as CVE page is older than CVRF-CVE file. skipping CVE-2023-50186 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-50010 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49994 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49993 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49992 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49991 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49990 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49606 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49582 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49502 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49295 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-49286 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49286 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-49285 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-49285 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-49284 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49284 skipping CVE-2023-49141 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49088 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49086 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49085 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-49084 skipping CVE-2023-49083 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48795 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-48795 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-48795 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48706 skipping CVE-2023-48733 as CVE page is older than CVRF-CVE file. CVE-2023-48368: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-48368: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-48368: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48368 CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-48368: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-48368: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-48368: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-48368: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-48368: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-48368: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-48368: no packages for SUSE Manager Server 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48237 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48236 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48235 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48234 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48233 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48232 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-48231 skipping CVE-2023-48161 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47855 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47641 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47627 CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-47282: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-47282: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-47282: no packages for SUSE Manager Proxy 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47282 CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-47282: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-47282: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-47282: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-47282: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-47282: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-47282: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-47282: no packages for SUSE Manager Server 4.3, but entry? no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-47272 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47235 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47234 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47233 CVE-2023-47169: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-47169: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-47169: no packages for SUSE Manager Proxy 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47169 CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-47169: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-47169: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-47169: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-47169: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-47169: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-47169: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-47169: no packages for SUSE Manager Server 4.3, but entry? skipping CVE-2023-47210 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-47108 skipping CVE-2023-47100 as CVE page is older than CVRF-CVE file. skipping CVE-2023-47039 as CVE page is older than CVRF-CVE file. skipping CVE-2023-47038 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46862 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46848 skipping CVE-2023-46850 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46849 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46847 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46846 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46839 skipping CVE-2023-46841 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46840 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46836 skipping CVE-2023-46838 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46835 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46809 skipping CVE-2023-46813 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46737 skipping CVE-2023-46753 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46752 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46751 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-46728 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46728 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-46724 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46724 skipping CVE-2023-46589 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46343 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46316 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46246 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46228 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-46228 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46137 skipping CVE-2023-46219 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46218 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46159 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46136 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46122 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-46121 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46118 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-46103 skipping CVE-2023-46051 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46049 as CVE page is older than CVRF-CVE file. skipping CVE-2023-46048 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-46009 skipping CVE-2023-45935 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45931 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45929 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45927 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45925 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45922 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45922.xml 2024-10-20 01:36:35.068541000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45922.xml.new 2024-10-29 01:27:33.326195000 +0100 @@ -14,13 +14,13 @@ 1 - 8 - 2024-10-19T23:36:34Z + 9 + 2024-10-29T00:27:32Z current 2024-03-28T00:13:31Z - 2024-10-19T23:36:34Z + 2024-10-29T00:27:32Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -54,6 +54,16 @@ + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -334,6 +344,253 @@ openSUSE Leap Micro 5.5 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + Mesa @@ -1054,6 +1311,42 @@ libxatracker2-1.0.0-150600.83.3.1 + + Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libgbm1-21.2.4-150400.68.15.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2935,36 +3228,6 @@ Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - Mesa-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libEGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libEGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libGLESv2-2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libglapi0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libglapi0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgbm1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgbm1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -3441,6 +3704,18 @@ CVE-2023-45922 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-dri-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libEGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libglapi0-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:libgbm1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-dri-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libEGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libglapi0-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libgbm1-18.3.2-14.9.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:libgbm1-21.2.4-150400.68.15.1 Image SLES15-SP4-SAP-Azure-LI-BYOS-Production:libgbm1-21.2.4-150400.68.15.1 Image SLES15-SP4-SAP-Azure-VLI-BYOS:libgbm1-21.2.4-150400.68.15.1 @@ -3782,6 +4057,229 @@ openSUSE Leap Micro 5.5:Mesa-libglapi0-22.3.5-150500.77.5.1 openSUSE Leap Micro 5.5:libgbm1-22.3.5-150500.77.5.1 + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45919 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45919.xml 2024-10-20 01:36:35.967988000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45919.xml.new 2024-10-29 01:27:34.372129000 +0100 @@ -14,13 +14,13 @@ 1 - 8 - 2024-10-19T23:36:35Z + 9 + 2024-10-29T00:27:33Z current 2024-03-28T00:13:32Z - 2024-10-19T23:36:35Z + 2024-10-29T00:27:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -54,6 +54,16 @@ + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -334,6 +344,253 @@ openSUSE Leap Micro 5.5 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + Mesa @@ -1054,6 +1311,42 @@ libxatracker2-1.0.0-150600.83.3.1 + + Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libgbm1-21.2.4-150400.68.15.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2935,36 +3228,6 @@ Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - Mesa-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libEGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libEGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libGLESv2-2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libglapi0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libglapi0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgbm1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgbm1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -3441,6 +3704,18 @@ CVE-2023-45919 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-dri-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libEGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libglapi0-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:libgbm1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-dri-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libEGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libglapi0-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libgbm1-18.3.2-14.9.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:libgbm1-21.2.4-150400.68.15.1 Image SLES15-SP4-SAP-Azure-LI-BYOS-Production:libgbm1-21.2.4-150400.68.15.1 Image SLES15-SP4-SAP-Azure-VLI-BYOS:libgbm1-21.2.4-150400.68.15.1 @@ -3782,6 +4057,229 @@ openSUSE Leap Micro 5.5:Mesa-libglapi0-22.3.5-150500.77.5.1 openSUSE Leap Micro 5.5:libgbm1-22.3.5-150500.77.5.1 + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45918.xml 2024-10-19 01:38:41.106738000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45918.xml.new 2024-10-29 01:27:35.345070000 +0100 @@ -14,13 +14,13 @@ 1 - 77 - 2024-10-18T23:38:40Z + 78 + 2024-10-29T00:27:34Z current 2024-02-20T00:10:24Z - 2024-10-18T23:38:40Z + 2024-10-29T00:27:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -28,7 +28,7 @@ CVE-2023-45918 - ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c. + ** DISPUTED ** ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c. NOTE: Multiple third parties have disputed this indicating upstream does not regard it as a security issue. The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0). @@ -7053,36 +7053,6 @@ ncurses as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP4 - - libncurses5 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libncurses5-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libncurses6 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libncurses6-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - ncurses-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - ncurses-devel-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - ncurses-utils as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - tack as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - terminfo as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - terminfo-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - ncurses as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -7413,7 +7383,7 @@ - ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c. + ** DISPUTED ** ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c. NOTE: Multiple third parties have disputed this indicating upstream does not regard it as a security issue. CVE-2023-45918 @@ -8796,17 +8766,7 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:tack SUSE Linux Enterprise Server for SAP Applications 12 SP4:terminfo SUSE Linux Enterprise Server for SAP Applications 12 SP4:terminfo-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5 - SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses5-32bit - SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6 - SUSE Linux Enterprise Server for SAP Applications 12 SP5:libncurses6-32bit SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses - SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-devel-32bit - SUSE Linux Enterprise Server for SAP Applications 12 SP5:ncurses-utils - SUSE Linux Enterprise Server for SAP Applications 12 SP5:tack - SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo - SUSE Linux Enterprise Server for SAP Applications 12 SP5:terminfo-base SUSE OpenStack Cloud 9:libncurses5 SUSE OpenStack Cloud 9:libncurses5-32bit SUSE OpenStack Cloud 9:libncurses6 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45913 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45913.xml 2024-10-20 01:36:36.492954000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45913.xml.new 2024-10-29 01:27:36.103070000 +0100 @@ -14,13 +14,13 @@ 1 - 8 - 2024-10-19T23:36:36Z + 9 + 2024-10-29T00:27:35Z current 2024-03-28T00:13:33Z - 2024-10-19T23:36:36Z + 2024-10-29T00:27:35Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -54,6 +54,16 @@ + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -334,6 +344,253 @@ openSUSE Leap Micro 5.5 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + Mesa @@ -1054,6 +1311,42 @@ libxatracker2-1.0.0-150600.83.3.1 + + Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + Mesa-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-dri-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-libEGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-libGL1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + Mesa-libglapi0-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + libgbm1-18.3.2-14.9.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libgbm1-21.2.4-150400.68.15.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2935,36 +3228,6 @@ Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - Mesa-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libEGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libEGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libGL1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libGL1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libGLESv2-2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libglapi0 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - Mesa-libglapi0-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgbm1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libgbm1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - Mesa as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2 @@ -3441,6 +3704,18 @@ CVE-2023-45913 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-dri-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libEGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:Mesa-libglapi0-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-BYOS:libgbm1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-dri-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libEGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libGL1-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:Mesa-libglapi0-18.3.2-14.9.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libgbm1-18.3.2-14.9.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:libgbm1-21.2.4-150400.68.15.1 Image SLES15-SP4-SAP-Azure-LI-BYOS-Production:libgbm1-21.2.4-150400.68.15.1 Image SLES15-SP4-SAP-Azure-VLI-BYOS:libgbm1-21.2.4-150400.68.15.1 @@ -3782,6 +4057,229 @@ openSUSE Leap Micro 5.5:Mesa-libglapi0-22.3.5-150500.77.5.1 openSUSE Leap Micro 5.5:libgbm1-22.3.5-150500.77.5.1 + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45897 skipping CVE-2023-45898 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45871 skipping CVE-2023-45896 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45872 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45866 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45863 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45862 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45853 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45803 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45745 skipping CVE-2023-45802 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45733 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45648 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45290 skipping CVE-2023-45322 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45290.xml 2024-10-26 01:21:28.640993000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45290.xml.new 2024-10-29 01:27:45.856038000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-25T23:21:28Z + 27 + 2024-10-29T00:27:45Z current 2024-03-07T00:13:09Z - 2024-10-25T23:21:28Z + 2024-10-29T00:27:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -317,6 +317,24 @@ go1.22-libstd-1.22.1-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.1-1.1 @@ -869,6 +887,42 @@ go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + @@ -1022,6 +1076,20 @@ openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1 openSUSE Tumbleweed:go1.22-race-1.22.1-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45289 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45289.xml 2024-10-26 01:21:29.267940000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45289.xml.new 2024-10-29 01:27:46.413036000 +0100 @@ -14,13 +14,13 @@ 1 - 19 - 2024-10-25T23:21:28Z + 20 + 2024-10-29T00:27:46Z current 2024-03-07T00:13:10Z - 2024-10-25T23:21:28Z + 2024-10-29T00:27:46Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -258,6 +258,24 @@ go1.22-libstd-1.22.1-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.1-1.1 @@ -603,6 +621,42 @@ go1.22-race-1.22.1-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + @@ -713,6 +767,20 @@ openSUSE Tumbleweed:go1.22-libstd-1.22.1-1.1 openSUSE Tumbleweed:go1.22-race-1.22.1-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45288 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45288.xml 2024-10-26 01:21:29.983949000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-45288.xml.new 2024-10-29 01:27:47.218980000 +0100 @@ -14,13 +14,13 @@ 1 - 50 - 2024-10-25T23:21:29Z + 51 + 2024-10-29T00:27:46Z current 2024-04-04T23:12:13Z - 2024-10-25T23:21:29Z + 2024-10-29T00:27:46Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1664,6 +1664,24 @@ go1.22-libstd-1.22.2-1.1 + + go1.22-openssl-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 + go1.22-race-1.22.2-1.1 @@ -3740,6 +3758,42 @@ traefik2-2.11.5-1.1 as a component of openSUSE Tumbleweed + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 + + + go1.22-openssl-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-doc-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-race-1.22.7.1-150000.1.3.1 as a component of openSUSE Leap 15.5 + + + go1.22-openssl-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-doc-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + + + go1.22-openssl-race-1.22.7.1-150600.13.3.1 as a component of openSUSE Leap 15.6 + kubernetes1.18-client as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS @@ -4580,6 +4634,20 @@ openSUSE Tumbleweed:traefik-2.11.2-1.1 openSUSE Tumbleweed:traefik2-2.11.5-1.1 + + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.5:go1.22-openssl-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-doc-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.5:go1.22-openssl-race-1.22.7.1-150000.1.3.1 + openSUSE Leap 15.6:go1.22-openssl-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-doc-1.22.7.1-150600.13.3.1 + openSUSE Leap 15.6:go1.22-openssl-race-1.22.7.1-150600.13.3.1 + SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kubernetes1.18 SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kubernetes1.18-client no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45283 skipping CVE-2023-45285 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45284 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45237 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45236 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45235 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45234 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45233 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45232 as CVE page is older than CVRF-CVE file. skipping CVE-2023-45231 as CVE page is older than CVRF-CVE file. CVE-2023-45221: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-45221: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-45221: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45221 CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-45221: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-45221: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-45221: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-45221: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-45221: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-45221: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-45221: no packages for SUSE Manager Server 4.3, but entry? skipping CVE-2023-45229 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45145 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45143 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-45142 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-45142 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-45142 no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-45142 CVE-2023-44487: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2023-44487: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-44487 CVE-2023-44487: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2023-44487: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-44487: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2023-44487: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? skipping CVE-2023-44488 as CVE page is older than CVRF-CVE file. skipping CVE-2023-44466 as CVE page is older than CVRF-CVE file. skipping CVE-2023-44446 as CVE page is older than CVRF-CVE file. skipping CVE-2023-44431 as CVE page is older than CVRF-CVE file. skipping CVE-2023-44429 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-44271 skipping CVE-2023-44398 as CVE page is older than CVRF-CVE file. skipping CVE-2023-44387 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-43907 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-43907 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43804 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43788 skipping CVE-2023-43789 as CVE page is older than CVRF-CVE file. skipping CVE-2023-43787 as CVE page is older than CVRF-CVE file. skipping CVE-2023-43786 as CVE page is older than CVRF-CVE file. skipping CVE-2023-43785 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-43665 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-43665 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43655 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43641 skipping CVE-2023-43622 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-43490 skipping CVE-2023-43361 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2023-43091 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/43xxxx/CVE-2023-43091.json:No such file or directory skipping CVE-2023-43115 as CVE page is older than CVRF-CVE file. skipping CVE-2023-43114 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42956 skipping CVE-2023-43090 as CVE page is older than CVRF-CVE file. skipping CVE-2023-43040 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42950 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42852 skipping CVE-2023-42917 as CVE page is older than CVRF-CVE file. skipping CVE-2023-42916 as CVE page is older than CVRF-CVE file. skipping CVE-2023-42890 as CVE page is older than CVRF-CVE file. skipping CVE-2023-42883 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42843 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42822 skipping CVE-2023-42833 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42795 skipping CVE-2023-42794 as CVE page is older than CVRF-CVE file. skipping CVE-2023-42756 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42754 skipping CVE-2023-42753 as CVE page is older than CVRF-CVE file. skipping CVE-2023-42752 as CVE page is older than CVRF-CVE file. skipping CVE-2023-42670 as CVE page is older than CVRF-CVE file. skipping CVE-2023-42669 as CVE page is older than CVRF-CVE file. skipping CVE-2023-42667 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-42465 skipping CVE-2023-42467 as CVE page is older than CVRF-CVE file. skipping CVE-2023-42445 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42363 no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-42363 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42119 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42119 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42117 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42117 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42116 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42116 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42115 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42115 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-42114 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-42114 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-41983 skipping CVE-2023-41993 as CVE page is older than CVRF-CVE file. skipping CVE-2023-41915 as CVE page is older than CVRF-CVE file. skipping CVE-2023-41913 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-41900 skipping CVE-2023-41909 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-41419 skipping CVE-2023-41361 as CVE page is older than CVRF-CVE file. skipping CVE-2023-41360 as CVE page is older than CVRF-CVE file. skipping CVE-2023-41359 as CVE page is older than CVRF-CVE file. skipping CVE-2023-41358 as CVE page is older than CVRF-CVE file. skipping CVE-2023-41105 as CVE page is older than CVRF-CVE file. skipping CVE-2023-41080 as CVE page is older than CVRF-CVE file. skipping CVE-2023-41074 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-41040 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-41040 No V5 entry found for CVE-2023-40782 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/40xxxx/CVE-2023-40782.json:No such file or directory skipping CVE-2023-40791 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40661 skipping CVE-2023-40745 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40660 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40551 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40550 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40549 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40548 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40547 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40546 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-40533 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40477 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40359 skipping CVE-2023-40476 as CVE page is older than CVRF-CVE file. skipping CVE-2023-40475 as CVE page is older than CVRF-CVE file. skipping CVE-2023-40474 as CVE page is older than CVRF-CVE file. skipping CVE-2023-40451 as CVE page is older than CVRF-CVE file. skipping CVE-2023-40414 as CVE page is older than CVRF-CVE file. skipping CVE-2023-40400 as CVE page is older than CVRF-CVE file. skipping CVE-2023-40397 as CVE page is older than CVRF-CVE file. skipping CVE-2023-40360 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40305 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-40217 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40217 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-40217.xml 2024-10-22 02:05:08.564148000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-40217.xml.new 2024-10-29 01:28:33.196119000 +0100 @@ -14,13 +14,13 @@ 1 - 108 - 2024-10-22T00:05:07Z + 109 + 2024-10-29T00:28:32Z current 2023-08-28T23:16:45Z - 2024-10-22T00:05:07Z + 2024-10-29T00:28:32Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2977,6 +2977,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -9538,6 +9556,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.18-1.1 as a component of openSUSE Tumbleweed @@ -11979,6 +12015,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.18-1.1 openSUSE Tumbleweed:python38-curses-3.8.18-1.1 openSUSE Tumbleweed:python38-dbm-3.8.18-1.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40184 skipping CVE-2023-40175 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40167 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-40030 skipping CVE-2023-39978 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39976 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39975 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39929 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39928 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39804 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39742 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39516 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39516 skipping CVE-2023-39615 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39593 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39515 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39515 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39514 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39514 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39513 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39513 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39512 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39512 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39511 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39511 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39510 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39510 skipping CVE-2023-39434 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39418 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39417 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39368 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39366 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39366 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39365 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39365 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39364 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39364 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39362 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39362 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39361 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39361 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39360 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39360 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39359 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39359 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39358 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39358 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-39357 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39357 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39333 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39325 skipping CVE-2023-39328 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39327 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39326 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39322 skipping CVE-2023-39323 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39321 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39320 skipping CVE-2023-39319 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39318 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39198 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39194 skipping CVE-2023-39197 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39193 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39192 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-39189 skipping CVE-2023-39191 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39190 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39180 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39179 as CVE page is older than CVRF-CVE file. skipping CVE-2023-39176 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-39070 skipping CVE-2023-38898 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38802 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38709 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38633 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38611 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38600 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38599 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38597 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38595 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38594 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38592 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38575 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38552 skipping CVE-2023-38572 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38560 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38559 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38546 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38545 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38497 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-38496 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38470 skipping CVE-2023-38473 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38472 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38471 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-38408 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38408 skipping CVE-2023-38469 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38432 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38431 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38430 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38429 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38428 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38427 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38426 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38417 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38409 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-38403 skipping CVE-2023-38407 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38406 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-38285 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-38285 skipping CVE-2023-38325 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38289 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38288 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38264 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38253 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38252 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38201 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38200 skipping CVE-2023-38197 as CVE page is older than CVRF-CVE file. skipping CVE-2023-38133 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-38039 No V5 entry found for CVE-2023-38037 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/38xxxx/CVE-2023-38037.json:No such file or directory no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-38037 skipping CVE-2023-37920 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37464 skipping CVE-2023-37536 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-37460 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37460 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37450 skipping CVE-2023-37453 as CVE page is older than CVRF-CVE file. skipping CVE-2023-37369 as CVE page is older than CVRF-CVE file. skipping CVE-2023-37329 as CVE page is older than CVRF-CVE file. skipping CVE-2023-37328 as CVE page is older than CVRF-CVE file. skipping CVE-2023-37327 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37212 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37211 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37210 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37209 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37208 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37207 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37206 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37205 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37204 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37203 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37202 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-37201 skipping CVE-2023-36664 as CVE page is older than CVRF-CVE file. skipping CVE-2023-36661 as CVE page is older than CVRF-CVE file. skipping CVE-2023-36660 as CVE page is older than CVRF-CVE file. skipping CVE-2023-36632 as CVE page is older than CVRF-CVE file. skipping CVE-2023-36617 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-36479 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-36478 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36274 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36273 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36272 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36271 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-36193 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36193 skipping CVE-2023-36268 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-36054 skipping CVE-2023-36191 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-36053 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-36053 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35946 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35945 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-35934 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35828 skipping CVE-2023-35829 as CVE page is older than CVRF-CVE file. skipping CVE-2023-35827 as CVE page is older than CVRF-CVE file. skipping CVE-2023-35826 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-35790 skipping CVE-2023-35824 as CVE page is older than CVRF-CVE file. skipping CVE-2023-35823 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35789 skipping CVE-2023-35788 as CVE page is older than CVRF-CVE file. skipping CVE-2023-35074 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-35001 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34968 skipping CVE-2023-34981 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34969 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34967 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34966 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34872 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34623 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34462 skipping CVE-2023-34475 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34474 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-34432 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-34432 skipping CVE-2023-34417 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34416 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34415 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34414 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34410 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34328 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34327 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34326 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34325 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34323 skipping CVE-2023-34324 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34322 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-34318 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-34318 skipping CVE-2023-34320 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34319 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34256 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34255 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34241 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34153 as CVE page is older than CVRF-CVE file. skipping CVE-2023-34151 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-34059 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34059 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-34058 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34058 No V5 entry found for CVE-2023-34049 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/34xxxx/CVE-2023-34049.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-34049 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2023-34049 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-34049 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-33865 skipping CVE-2023-33953 as CVE page is older than CVRF-CVE file. skipping CVE-2023-33952 as CVE page is older than CVRF-CVE file. skipping CVE-2023-33951 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-33864 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-33863 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-33850 skipping CVE-2023-33595 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-33476 skipping CVE-2023-33461 as CVE page is older than CVRF-CVE file. skipping CVE-2023-33460 as CVE page is older than CVRF-CVE file. skipping CVE-2023-33288 as CVE page is older than CVRF-CVE file. skipping CVE-2023-33285 as CVE page is older than CVRF-CVE file. skipping CVE-2023-33250 as CVE page is older than CVRF-CVE file. skipping CVE-2023-33204 as CVE page is older than CVRF-CVE file. skipping CVE-2023-33203 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-33201 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-33199 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-32784 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-32784 skipping CVE-2023-32763 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32762 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32732 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32731 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32728 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32727 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32726 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32725 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32724 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32723 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32722 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32721 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32700 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32681 skipping CVE-2023-32665 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-32627 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-32627 skipping CVE-2023-32643 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32636 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32629 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32573 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-32573 skipping CVE-2023-32611 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32559 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32439 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32435 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32393 skipping CVE-2023-32409 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32359 skipping CVE-2023-32373 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32370 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32360 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32324 skipping CVE-2023-32258 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32257 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32256 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32255 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32254 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32253 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32252 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32251 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32250 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32249 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32248 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32247 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32246 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32233 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32215 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32214 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32213 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32212 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32211 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2023-32197 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/32xxxx/CVE-2023-32197.json:No such file or directory skipping CVE-2023-32207 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32206 as CVE page is older than CVRF-CVE file. skipping CVE-2023-32205 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-32184 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-32184 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32181 skipping CVE-2023-32182 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-32067 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32067 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32006 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32002 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-32001 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-31794 skipping CVE-2023-31582 as CVE page is older than CVRF-CVE file. skipping CVE-2023-31557 as CVE page is older than CVRF-CVE file. skipping CVE-2023-31554 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-31486 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-31486 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31484 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31436 skipping CVE-2023-31439 as CVE page is older than CVRF-CVE file. skipping CVE-2023-31438 as CVE page is older than CVRF-CVE file. skipping CVE-2023-31437 as CVE page is older than CVRF-CVE file. skipping CVE-2023-31356 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31147 skipping CVE-2023-31315 as CVE page is older than CVRF-CVE file. skipping CVE-2023-31248 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31130 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31124 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31122 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31085 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31084 skipping CVE-2023-31083 as CVE page is older than CVRF-CVE file. skipping CVE-2023-31082 as CVE page is older than CVRF-CVE file. skipping CVE-2023-31081 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-31022 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30861 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-30801 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-30801 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30630 skipping CVE-2023-30775 as CVE page is older than CVRF-CVE file. skipping CVE-2023-30774 as CVE page is older than CVRF-CVE file. skipping CVE-2023-30772 as CVE page is older than CVRF-CVE file. CVE-2023-30608: no packages for Image SLES15-SP6, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP5, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP4, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2023-30608: no packages for openSUSE Leap Micro 5.4, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2023-30608: no packages for Container bci/python:3.11-42.5, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP4, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2023-30608: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP6, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Server 15 SP4-LTSS, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2023-30608: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2023-30608: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2023-30608: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2023-30608: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2023-30608: no packages for Container bci/python:3, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP5, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30608 CVE-2023-30608: no packages for Container bci/python:3, but entry? CVE-2023-30608: no packages for Container bci/python:3.11-42.5, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP4, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP6, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Server 15 SP4-LTSS, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP4, but entry? CVE-2023-30608: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-30608: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-30608: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-30608: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2023-30608: no packages for openSUSE Leap Micro 5.4, but entry? CVE-2023-30608: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2023-30608: no packages for Container bci/python:3, but entry? CVE-2023-30608: no packages for Container bci/python:3.11-42.5, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2023-30608: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP4, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Micro 5.5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Module for Python 3 15 SP6, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Server 15 SP4-LTSS, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP4, but entry? CVE-2023-30608: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-30608: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-30608: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-30608: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2023-30608: no packages for openSUSE Leap Micro 5.4, but entry? CVE-2023-30608: no packages for openSUSE Leap Micro 5.5, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP4, but entry? CVE-2023-30608: no packages for SUSE Linux Enterprise Installer Updates 15 SP5, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30590 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30589 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30588 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30585 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30581 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-30577 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-30577 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30551 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-30549 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-30534 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-30534 no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-30464 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30441 skipping CVE-2023-30456 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30079 skipping CVE-2023-30086 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-30078 skipping CVE-2023-29942 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29941 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29939 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29935 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29934 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29933 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29932 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29659 skipping CVE-2023-29552 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29550 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29548 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29545 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29542 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29541 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29539 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29536 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29535 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29533 skipping CVE-2023-29534 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29532 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29531 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29483 skipping CVE-2023-29499 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29491 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29469 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29457 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29456 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29455 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29454 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29452 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29451 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29405 skipping CVE-2023-29449 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29409 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29408 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29407 as CVE page is older than CVRF-CVE file. skipping CVE-2023-29406 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29404 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29403 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29402 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29400 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-29383 skipping CVE-2023-29007 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28938 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-28882 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-28882 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28859 skipping CVE-2023-28879 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28866 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28858 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28856 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28842 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28841 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28840 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28736 skipping CVE-2023-28756 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28755 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28746 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28709 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28708 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28642 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28625 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-28488 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-28488 skipping CVE-2023-28531 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28487 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28486 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28466 skipping CVE-2023-28484 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-28452 skipping CVE-2023-28464 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-28371 skipping CVE-2023-28410 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28370 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2023-28370 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-28370 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28322 skipping CVE-2023-28362 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28328 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28327 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28321 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28320 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-28319 skipping CVE-2023-28205 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28204 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28198 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28177 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28176 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28164 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28163 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28162 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28161 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28160 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28159 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28120 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28101 as CVE page is older than CVRF-CVE file. skipping CVE-2023-28100 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27986 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27985 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27954 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27932 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-27786 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-27786 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-27783 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-27783 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-27586 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-27586 skipping CVE-2023-27655 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27561 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27530 skipping CVE-2023-27539 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27538 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27537 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27536 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27535 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27534 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27533 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27522 skipping CVE-2023-27478 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27320 skipping CVE-2023-27371 as CVE page is older than CVRF-CVE file. skipping CVE-2023-27349 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-27043 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-27043.xml 2024-10-22 02:13:22.339843000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-27043.xml.new 2024-10-29 01:31:52.836105000 +0100 @@ -14,13 +14,13 @@ 1 - 122 - 2024-10-22T00:13:21Z + 123 + 2024-10-29T00:31:51Z current 2023-04-19T23:17:17Z - 2024-10-22T00:13:21Z + 2024-10-29T00:31:51Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2793,6 +2793,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36-3.6.15-52.1 @@ -7866,6 +7884,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.17-2.1 as a component of openSUSE Tumbleweed @@ -10091,6 +10127,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.17-2.1 openSUSE Tumbleweed:python38-curses-3.8.17-2.1 openSUSE Tumbleweed:python38-dbm-3.8.17-2.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26964 no cpe found for SUSE Package Hub 15 SP6 in CVE-2023-26964 skipping CVE-2023-26966 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26965 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26938 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26937 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26936 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26935 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26934 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26931 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26930 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26924 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26768 skipping CVE-2023-26785 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26769 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26767 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26607 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26606 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26605 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26604 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26545 skipping CVE-2023-26555 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26554 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26553 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26552 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26551 as CVE page is older than CVRF-CVE file. skipping CVE-2023-26544 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26484 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-26437 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-26437 skipping CVE-2023-26463 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-26157 skipping CVE-2023-26242 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26112 skipping CVE-2023-26083 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26049 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-26048 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25809 skipping CVE-2023-25815 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2023-25727 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25727 skipping CVE-2023-25775 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25752 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25751 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25750 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25749 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25748 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25747 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25746 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25745 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25744 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25743 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25742 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25741 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25740 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25739 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25738 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25737 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25736 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25735 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25734 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25733 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25732 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25731 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25730 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25729 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25728 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25690 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25579 skipping CVE-2023-25652 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25588 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25587 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25586 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25585 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25584 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25577 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25567 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25566 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25565 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25564 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25563 skipping CVE-2023-25435 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25434 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25433 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25363 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25362 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25361 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25360 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25358 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25193 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25180 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25173 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-25165 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25155 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-25153 skipping CVE-2023-25139 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25136 as CVE page is older than CVRF-CVE file. skipping CVE-2023-25012 as CVE page is older than CVRF-CVE file. skipping CVE-2023-24998 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24807 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-24785 skipping CVE-2023-24805 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24607 CVE-2023-24580: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2023-24580: no packages for openSUSE Leap 15.5, but entry? no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-24580 CVE-2023-24580: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2023-24580: no packages for openSUSE Leap 15.5, but entry? CVE-2023-24580: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2023-24580: no packages for openSUSE Leap 15.5, but entry? skipping CVE-2023-24593 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24540 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24539 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24538 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24537 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24536 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24534 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24532 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24329 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-24329.xml 2024-10-14 01:46:36.000527000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-24329.xml.new 2024-10-29 01:32:30.334158000 +0100 @@ -14,13 +14,13 @@ 1 - 137 - 2024-10-13T23:46:35Z + 138 + 2024-10-29T00:32:29Z current 2023-02-21T00:16:57Z - 2024-10-13T23:46:35Z + 2024-10-29T00:32:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3200,6 +3200,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -10625,6 +10643,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.16-5.1 as a component of openSUSE Tumbleweed @@ -13132,6 +13168,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.16-5.1 openSUSE Tumbleweed:python38-32bit-3.8.16-5.1 openSUSE Tumbleweed:python38-curses-3.8.16-5.1 no cpe found for SUSE Package Hub 15 SP3 in CVE-2023-24056 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24023 skipping CVE-2023-24039 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-24021 CVE-2023-23969: no packages for SUSE Package Hub 15 SP5, but entry? no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-23969 CVE-2023-23969: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2023-23969: no packages for SUSE Package Hub 15 SP5, but entry? skipping CVE-2023-23946 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-23942 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-23942 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23936 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23920 skipping CVE-2023-23931 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23919 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23918 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23908 skipping CVE-2023-23916 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23915 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23914 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23913 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23606 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23605 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23604 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23603 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23602 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23601 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23600 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23599 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23598 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23597 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23583 skipping CVE-2023-23586 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-23457 skipping CVE-2023-23559 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23529 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23518 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23517 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-23456 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23455 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-23454 skipping CVE-2023-23039 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23006 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23005 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23004 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23003 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23002 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23001 as CVE page is older than CVRF-CVE file. skipping CVE-2023-23000 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22999 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22998 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22997 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22996 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22995 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-22809 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22809 skipping CVE-2023-22799 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22796 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22795 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22792 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22745 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22742 as CVE page is older than CVRF-CVE file. CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-22656: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-22656: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-22656: no packages for SUSE Manager Proxy 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22656 CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-22656: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-22656: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-22656: no packages for SUSE Manager Server 4.3, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Module for Desktop Applications 15 SP6, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2023-22656: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2023-22656: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2023-22656: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2023-22656: no packages for SUSE Manager Server 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22655 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22652 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22643 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22486 skipping CVE-2023-22490 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22458 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22313 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-22084 skipping CVE-2023-22081 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22067 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22051 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22049 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22045 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22044 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22043 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22041 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22036 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22033 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22025 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22024 as CVE page is older than CVRF-CVE file. skipping CVE-2023-22006 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21968 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21967 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21954 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21939 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21938 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21937 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21930 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21843 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21835 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21830 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21636 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20900 skipping CVE-2023-21400 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21264 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21106 as CVE page is older than CVRF-CVE file. skipping CVE-2023-21102 as CVE page is older than CVRF-CVE file. skipping CVE-2023-20941 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20898 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2023-20898 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-20898 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20897 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2023-20897 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-20897 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20867 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20593 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-20592 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20592 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20588 skipping CVE-2023-20584 as CVE page is older than CVRF-CVE file. skipping CVE-2023-20583 as CVE page is older than CVRF-CVE file. skipping CVE-2023-20573 as CVE page is older than CVRF-CVE file. skipping CVE-2023-20569 as CVE page is older than CVRF-CVE file. skipping CVE-2023-20566 as CVE page is older than CVRF-CVE file. skipping CVE-2023-20533 as CVE page is older than CVRF-CVE file. skipping CVE-2023-20526 as CVE page is older than CVRF-CVE file. skipping CVE-2023-20521 as CVE page is older than CVRF-CVE file. skipping CVE-2023-20519 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20197 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20052 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-20032 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-7256 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-7256.xml 2024-10-20 01:44:30.897597000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-7256.xml.new 2024-10-29 01:33:29.609036000 +0100 @@ -14,13 +14,13 @@ 1 - 20 - 2024-10-19T23:44:30Z + 21 + 2024-10-29T00:33:29Z current 2024-09-02T23:26:00Z - 2024-10-19T23:44:30Z + 2024-10-29T00:33:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -79,6 +79,21 @@ Container suse/sle-micro/5.5/toolbox:13.2-3.5.37 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -962,6 +977,15 @@ libpcap1-1.10.1-150400.3.3.2 as a component of Container suse/sle-micro/5.5/toolbox:13.2-3.5.37 + + libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-BYOS + + + libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + libpcap1-1.8.1-10.6.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + libpcap1-1.10.1-150400.3.3.2 as a component of Image SLES15-SP4-CHOST-BYOS @@ -1361,9 +1385,6 @@ libpcap as a component of SUSE Linux Enterprise Server Teradata 12 SP3-LTSS - - libpcap1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - libpcap as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -1434,6 +1455,9 @@ Container suse/sle-micro/5.3/toolbox:13.2-6.11.23:libpcap1-1.10.1-150400.3.3.2 Container suse/sle-micro/5.4/toolbox:13.2-5.19.24:libpcap1-1.10.1-150400.3.3.2 Container suse/sle-micro/5.5/toolbox:13.2-3.5.37:libpcap1-1.10.1-150400.3.3.2 + Image SLES12-SP5-GCE-BYOS:libpcap1-1.8.1-10.6.1 + Image SLES12-SP5-GCE-SAP-BYOS:libpcap1-1.8.1-10.6.1 + Image SLES12-SP5-GCE-SAP-On-Demand:libpcap1-1.8.1-10.6.1 Image SLES15-SP4-CHOST-BYOS:libpcap1-1.10.1-150400.3.3.2 Image SLES15-SP4-CHOST-BYOS-Aliyun:libpcap1-1.10.1-150400.3.3.2 Image SLES15-SP4-CHOST-BYOS-Azure:libpcap1-1.10.1-150400.3.3.2 No V5 entry found for CVE-2023-7217 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/7xxxx/CVE-2023-7217.json:No such file or directory skipping CVE-2023-7216 as CVE page is older than CVRF-CVE file. skipping CVE-2023-7207 as CVE page is older than CVRF-CVE file. skipping CVE-2023-7192 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2023-7122 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/7xxxx/CVE-2023-7122.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-7101 skipping CVE-2023-7104 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-7042 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-7024 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-7024 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6932 skipping CVE-2023-7008 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6931 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6918 skipping CVE-2023-6917 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6915 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6867 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6865 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6864 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6863 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6862 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6861 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6860 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6859 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6858 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6857 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6856 skipping CVE-2023-6817 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6816 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6780 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6779 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6707 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6707 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6706 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6706 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6705 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6705 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6704 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6704 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6704 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6703 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6703 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6702 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6702 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6683 skipping CVE-2023-6693 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6610 skipping CVE-2023-6679 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6622 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2023-6605 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6605.json:No such file or directory skipping CVE-2023-6606 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2023-6604 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6604.json:No such file or directory No V5 entry found for CVE-2023-6603 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6603.json:No such file or directory No V5 entry found for CVE-2023-6602 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6602.json:No such file or directory No V5 entry found for CVE-2023-6601 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6601.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6597 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6546 skipping CVE-2023-6560 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6546.xml 2024-10-22 02:18:37.397814000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6546.xml.new 2024-10-29 01:33:48.899059000 +0100 @@ -14,13 +14,13 @@ 1 - 70 - 2024-10-22T00:18:36Z + 71 + 2024-10-29T00:33:48Z current 2023-12-23T00:17:29Z - 2024-10-22T00:18:36Z + 2024-10-29T00:33:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2132,12 +2132,18 @@ kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_60-default-14-150400.2.1 @@ -2186,12 +2192,18 @@ kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_5-rt-12-150500.2.1 @@ -2219,12 +2231,18 @@ kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_7-default-11-150500.2.1 @@ -2261,6 +2279,9 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150300_59_121-default-14-150300.2.1 @@ -2294,6 +2315,9 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-macros @@ -2480,6 +2504,9 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kselftests-kmp-64kb-5.14.21-150500.55.44.1 @@ -4394,6 +4421,33 @@ kernel-rt-5.14.21-150500.13.30.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE CaaS Platform 4.0 @@ -5577,6 +5631,17 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.30.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE CaaS Platform 4.0:kernel-default SUSE CaaS Platform 4.0:kernel-default-base no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6536 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6531 skipping CVE-2023-6535 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6531.xml 2024-10-22 02:18:40.072703000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6531.xml.new 2024-10-29 01:33:50.983926000 +0100 @@ -14,13 +14,13 @@ 1 - 102 - 2024-10-22T00:18:39Z + 103 + 2024-10-29T00:33:50Z current 2023-12-30T00:16:05Z - 2024-10-22T00:18:39Z + 2024-10-29T00:33:50Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2320,6 +2320,9 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-1-150200.5.3.3 @@ -2365,6 +2368,9 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-1-150300.7.3.5 @@ -5017,6 +5023,12 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + kernel-default as a component of SUSE CaaS Platform 4.0 @@ -6295,6 +6307,10 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 + + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE CaaS Platform 4.0:kernel-default SUSE CaaS Platform 4.0:kernel-default-base no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6516 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-6516 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6512 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6511 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6510 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6509 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6508 skipping CVE-2023-6507 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6478 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6377 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6351 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6351 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6351 skipping CVE-2023-6356 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6350 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6350 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6350 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6348 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6348 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6348 skipping CVE-2023-6349 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6347 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6347 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6347 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6346 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6346 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6346 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6345 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6345 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6345 skipping CVE-2023-6277 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6270 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6247.xml 2024-10-22 02:18:57.874763000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-6247.xml.new 2024-10-29 01:33:56.896107000 +0100 @@ -14,13 +14,13 @@ 1 - 3 - 2024-10-22T00:18:57Z + 4 + 2024-10-29T00:33:56Z current 2024-03-01T00:17:43Z - 2024-10-22T00:18:57Z + 2024-10-29T00:33:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -499,7 +499,7 @@ - low + moderate skipping CVE-2023-6246 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6238 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6237 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6228 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6212 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6209 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6208 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6207 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6206 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6205 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6204 skipping CVE-2023-6200 as CVE page is older than CVRF-CVE file. CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2023-6152: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2023-6152: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2023-6152: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-rc.3.1, but entry? CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-rc.4.56, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-rc.3.1, but entry? CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-rc.4.56, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2023-6152: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2023-6152: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-6152: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-rc.3.1, but entry? CVE-2023-6152: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-rc.4.56, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2023-6152: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2023-6152: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2023-6152: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-6152: no packages for SUSE Manager Tools for SLE Micro 5, but entry? skipping CVE-2023-6176 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6175 as CVE page is older than CVRF-CVE file. skipping CVE-2023-6174 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6121 skipping CVE-2023-6129 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-6112 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-6112 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-6112 skipping CVE-2023-6111 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6040 No V5 entry found for CVE-2023-6031 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/6xxxx/CVE-2023-6031.json:No such file or directory skipping CVE-2023-6039 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-6004 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5997 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5997 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5997 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5996 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5996 skipping CVE-2023-5981 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5972 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5859 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5859 skipping CVE-2023-5870 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5869 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5868 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5858 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5858 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5857 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5857 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5856 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5856 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5855 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5855 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5854 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5854 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5853 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5853 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5852 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5852 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5851 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5851 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5850 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5850 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5849 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5849 CVE-2023-5764: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-5764: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2023-5764: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2023-5764: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2023-5764: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-5764: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2023-5764: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2023-5764: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-5764: no packages for SUSE Manager Tools for SLE Micro 5, but entry? skipping CVE-2023-5841 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5824 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5752 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5717 skipping CVE-2023-5732 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5731 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5730 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5729 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5728 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5727 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5726 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5725 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5724 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5723 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5722 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5721 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5679 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5676 skipping CVE-2023-5678 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5633 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5631 skipping CVE-2023-5574 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5568 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5557 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5535 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5517 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-5517 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5487 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5487 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5487 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5486 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5486 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5486 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5485 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5485 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5485 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5484 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5484 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5484 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5483 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5483 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5483 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5482 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5482 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5481 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5481 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5481 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5480 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5480 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5479 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5479 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5479 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5478 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5478 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5478 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5477 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5477 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5477 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5476 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5476 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5476 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5475 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5475 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5475 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5474 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5474 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5474 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5473 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5473 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5473 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5472 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5472 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5472 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-5455 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5441 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5380 skipping CVE-2023-5388 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5366 skipping CVE-2023-5371 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5367 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5346 skipping CVE-2023-5363 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-5344 skipping CVE-2023-5345 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5341 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-5218 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-5218 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-5218 skipping CVE-2023-5217 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5197 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5187 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5186 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5178 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5176 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5175 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5174 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5173 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5172 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5171 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5170 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5169 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5168 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5158 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5157 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5156 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5129 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5090 as CVE page is older than CVRF-CVE file. skipping CVE-2023-5088 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4921 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4881 skipping CVE-2023-4911 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4909 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4908 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4907 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4906 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4905 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4904 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4903 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4902 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4901 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4900 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4875 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4874 skipping CVE-2023-4863 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4813 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4807 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4806 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4785 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4781 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4764 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4764 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4763 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4763 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4762 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4762 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4761 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4761 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4759 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4752 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4750 skipping CVE-2023-4751 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4738 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4735 skipping CVE-2023-4736 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4734 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4733 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-4727 skipping CVE-2023-4732 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4693 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4692 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4641 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-4623 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4623 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-4622 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4622 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4572 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4572 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4572 skipping CVE-2023-4611 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4610 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4585 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4584 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4583 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4582 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4581 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4580 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4579 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4578 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4577 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4576 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4575 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4574 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4573 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4569 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4563 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4513 skipping CVE-2023-4527 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4512 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4511 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4459 skipping CVE-2023-4504 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4458 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4431 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4431 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4430 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4430 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4429 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4429 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4428 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4428 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4427 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4427 skipping CVE-2023-4421 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-4408 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4408 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-4408 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4387 skipping CVE-2023-4394 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4389 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4368 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4368 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4368 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4367 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4367 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4367 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4366 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4366 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4366 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4365 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4365 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4365 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4364 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4364 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4364 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4363 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4363 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4363 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4362 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4362 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4362 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4361 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4361 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4361 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4360 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4360 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4360 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4359 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4359 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4359 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4358 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4358 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4358 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4357 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4357 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4357 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4356 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4356 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4356 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4355 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4355 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4355 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4354 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4354 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4354 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4353 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4353 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4353 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4352 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4352 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4352 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4351 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4351 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4351 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4350 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4350 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4350 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4349 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4349 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4349 skipping CVE-2023-4273 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4244 skipping CVE-2023-4236 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4218 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4128 skipping CVE-2023-4205 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4194 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4156 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4155 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4154 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4147 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4135 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4134 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4133 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4132 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4091 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4078 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4078 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4078 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4077 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4077 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4077 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4076 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4076 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4076 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4075 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4075 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4075 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4074 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4074 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4074 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4073 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4073 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4073 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4072 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4072 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4072 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4071 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4071 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4071 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4070 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4070 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4070 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4069 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4069 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4069 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-4068 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-4068 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-4068 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP5 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP3 in CVE-2023-4039 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP4 in CVE-2023-4039 skipping CVE-2023-4058 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4057 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4056 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4055 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4054 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4053 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4052 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4051 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4050 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4049 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4048 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4047 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4046 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4045 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4042 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4016 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4015 as CVE page is older than CVRF-CVE file. skipping CVE-2023-4004 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-3978.xml 2024-07-27 01:27:19.684942000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-3978.xml.new 2024-10-29 01:35:13.620147000 +0100 @@ -14,13 +14,13 @@ 1 - 4 - 2024-07-26T23:27:19Z + 5 + 2024-10-29T00:35:13Z current 2023-08-03T23:17:55Z - 2024-07-26T23:27:19Z + 2024-10-29T00:35:13Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -131,6 +131,11 @@ SUSE Linux Enterprise Module for Package Hub 15 SP5 + + + SUSE Linux Enterprise Module for Package Hub 15 SP6 + + SUSE Linux Enterprise Module for Public Cloud 15 SP1 @@ -212,6 +217,11 @@ SUSE Linux Enterprise Module for Containers 15 SP4 + + + SUSE Manager Proxy Module 4.3 + + SUSE Linux Enterprise Module for Public Cloud 15 SP1 @@ -242,6 +252,31 @@ SUSE Linux Enterprise Module for Containers 15 SP4 + + + SUSE Manager Server Module 4.3 + + + + + SUSE Manager Tools 12 + + + + + SUSE Manager Tools 15 + + + + + openSUSE Leap 15.5 + + + + + openSUSE Leap 15.6 + + openSUSE Tumbleweed @@ -253,6 +288,45 @@ golang-github-lusitaniae-apache_exporter-1.0.8-1.1 + + golang-github-lusitaniae-apache_exporter-1.0.8-1.24.3 + + + golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 + + + golang-github-prometheus-promu-0.16.0-1.21.3 + + + golang-github-prometheus-promu-0.16.0-150000.3.21.4 + + + mgr-daemon-4.3.11-1.53.2 + + + mgr-daemon-4.3.11-150000.1.53.5 + + + mgrctl-0.1.23-1.13.2 + + + mgrctl-0.1.23-150000.1.13.3 + + + mgrctl-bash-completion-0.1.23-1.13.2 + + + mgrctl-bash-completion-0.1.23-150000.1.13.3 + + + mgrctl-lang-0.1.23-150000.1.13.3 + + + mgrctl-zsh-completion-0.1.23-1.13.2 + + + mgrctl-zsh-completion-0.1.23-150000.1.13.3 + podman-4.6.1-5.el9 @@ -271,6 +345,57 @@ podman-tests-4.6.1-5.el9 + + python2-spacewalk-check-4.3.21-52.104.2 + + + python2-spacewalk-client-setup-4.3.21-52.104.2 + + + python2-spacewalk-client-tools-4.3.21-52.104.2 + + + python2-uyuni-common-libs-5.0.5-1.45.2 + + + python3-spacewalk-check-4.3.21-150000.3.97.4 + + + python3-spacewalk-client-setup-4.3.21-150000.3.97.4 + + + python3-spacewalk-client-tools-4.3.21-150000.3.97.4 + + + python3-uyuni-common-libs-5.0.5-150000.1.45.3 + + + spacecmd-5.0.10-150000.3.127.3 + + + spacecmd-5.0.10-38.150.2 + + + spacewalk-check-4.3.21-150000.3.97.4 + + + spacewalk-check-4.3.21-52.104.2 + + + spacewalk-client-setup-4.3.21-150000.3.97.4 + + + spacewalk-client-setup-4.3.21-52.104.2 + + + spacewalk-client-tools-4.3.21-150000.3.97.4 + + + spacewalk-client-tools-4.3.21-52.104.2 + + + wire-0.6.0-150000.1.17.4 + yq @@ -295,6 +420,126 @@ golang-github-lusitaniae-apache_exporter-1.0.8-1.1 as a component of openSUSE Tumbleweed + + golang-github-prometheus-promu-0.16.0-150000.3.21.4 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5 + + + golang-github-prometheus-promu-0.16.0-150000.3.21.4 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6 + + + golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of SUSE Manager Proxy Module 4.3 + + + golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of SUSE Manager Server Module 4.3 + + + golang-github-lusitaniae-apache_exporter-1.0.8-1.24.3 as a component of SUSE Manager Tools 12 + + + golang-github-prometheus-promu-0.16.0-1.21.3 as a component of SUSE Manager Tools 12 + + + mgr-daemon-4.3.11-1.53.2 as a component of SUSE Manager Tools 12 + + + mgrctl-0.1.23-1.13.2 as a component of SUSE Manager Tools 12 + + + mgrctl-bash-completion-0.1.23-1.13.2 as a component of SUSE Manager Tools 12 + + + mgrctl-zsh-completion-0.1.23-1.13.2 as a component of SUSE Manager Tools 12 + + + python2-spacewalk-check-4.3.21-52.104.2 as a component of SUSE Manager Tools 12 + + + python2-spacewalk-client-setup-4.3.21-52.104.2 as a component of SUSE Manager Tools 12 + + + python2-spacewalk-client-tools-4.3.21-52.104.2 as a component of SUSE Manager Tools 12 + + + python2-uyuni-common-libs-5.0.5-1.45.2 as a component of SUSE Manager Tools 12 + + + spacecmd-5.0.10-38.150.2 as a component of SUSE Manager Tools 12 + + + spacewalk-check-4.3.21-52.104.2 as a component of SUSE Manager Tools 12 + + + spacewalk-client-setup-4.3.21-52.104.2 as a component of SUSE Manager Tools 12 + + + spacewalk-client-tools-4.3.21-52.104.2 as a component of SUSE Manager Tools 12 + + + golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of SUSE Manager Tools 15 + + + mgr-daemon-4.3.11-150000.1.53.5 as a component of SUSE Manager Tools 15 + + + mgrctl-0.1.23-150000.1.13.3 as a component of SUSE Manager Tools 15 + + + mgrctl-bash-completion-0.1.23-150000.1.13.3 as a component of SUSE Manager Tools 15 + + + mgrctl-lang-0.1.23-150000.1.13.3 as a component of SUSE Manager Tools 15 + + + mgrctl-zsh-completion-0.1.23-150000.1.13.3 as a component of SUSE Manager Tools 15 + + + python3-spacewalk-check-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15 + + + python3-spacewalk-client-setup-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15 + + + python3-spacewalk-client-tools-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15 + + + python3-uyuni-common-libs-5.0.5-150000.1.45.3 as a component of SUSE Manager Tools 15 + + + spacecmd-5.0.10-150000.3.127.3 as a component of SUSE Manager Tools 15 + + + spacewalk-check-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15 + + + spacewalk-client-setup-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15 + + + spacewalk-client-tools-4.3.21-150000.3.97.4 as a component of SUSE Manager Tools 15 + + + golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of openSUSE Leap 15.5 + + + golang-github-prometheus-promu-0.16.0-150000.3.21.4 as a component of openSUSE Leap 15.5 + + + spacecmd-5.0.10-150000.3.127.3 as a component of openSUSE Leap 15.5 + + + wire-0.6.0-150000.1.17.4 as a component of openSUSE Leap 15.5 + + + golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 as a component of openSUSE Leap 15.6 + + + golang-github-prometheus-promu-0.16.0-150000.3.21.4 as a component of openSUSE Leap 15.6 + + + spacecmd-5.0.10-150000.3.127.3 as a component of openSUSE Leap 15.6 + + + wire-0.6.0-150000.1.17.4 as a component of openSUSE Leap 15.6 + cni as a component of SUSE CaaS Platform 4.0 @@ -377,6 +622,48 @@ SUSE Liberty Linux 9:podman-tests-4.6.1-5.el9 openSUSE Tumbleweed:golang-github-lusitaniae-apache_exporter-1.0.8-1.1 + + SUSE Linux Enterprise Module for Package Hub 15 SP5:golang-github-prometheus-promu-0.16.0-150000.3.21.4 + SUSE Linux Enterprise Module for Package Hub 15 SP6:golang-github-prometheus-promu-0.16.0-150000.3.21.4 + SUSE Manager Proxy Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 + SUSE Manager Server Module 4.3:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 + SUSE Manager Tools 12:golang-github-lusitaniae-apache_exporter-1.0.8-1.24.3 + SUSE Manager Tools 12:golang-github-prometheus-promu-0.16.0-1.21.3 + SUSE Manager Tools 12:mgr-daemon-4.3.11-1.53.2 + SUSE Manager Tools 12:mgrctl-0.1.23-1.13.2 + SUSE Manager Tools 12:mgrctl-bash-completion-0.1.23-1.13.2 + SUSE Manager Tools 12:mgrctl-zsh-completion-0.1.23-1.13.2 + SUSE Manager Tools 12:python2-spacewalk-check-4.3.21-52.104.2 + SUSE Manager Tools 12:python2-spacewalk-client-setup-4.3.21-52.104.2 + SUSE Manager Tools 12:python2-spacewalk-client-tools-4.3.21-52.104.2 + SUSE Manager Tools 12:python2-uyuni-common-libs-5.0.5-1.45.2 + SUSE Manager Tools 12:spacecmd-5.0.10-38.150.2 + SUSE Manager Tools 12:spacewalk-check-4.3.21-52.104.2 + SUSE Manager Tools 12:spacewalk-client-setup-4.3.21-52.104.2 + SUSE Manager Tools 12:spacewalk-client-tools-4.3.21-52.104.2 + SUSE Manager Tools 15:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 + SUSE Manager Tools 15:mgr-daemon-4.3.11-150000.1.53.5 + SUSE Manager Tools 15:mgrctl-0.1.23-150000.1.13.3 + SUSE Manager Tools 15:mgrctl-bash-completion-0.1.23-150000.1.13.3 + SUSE Manager Tools 15:mgrctl-lang-0.1.23-150000.1.13.3 + SUSE Manager Tools 15:mgrctl-zsh-completion-0.1.23-150000.1.13.3 + SUSE Manager Tools 15:python3-spacewalk-check-4.3.21-150000.3.97.4 + SUSE Manager Tools 15:python3-spacewalk-client-setup-4.3.21-150000.3.97.4 + SUSE Manager Tools 15:python3-spacewalk-client-tools-4.3.21-150000.3.97.4 + SUSE Manager Tools 15:python3-uyuni-common-libs-5.0.5-150000.1.45.3 + SUSE Manager Tools 15:spacecmd-5.0.10-150000.3.127.3 + SUSE Manager Tools 15:spacewalk-check-4.3.21-150000.3.97.4 + SUSE Manager Tools 15:spacewalk-client-setup-4.3.21-150000.3.97.4 + SUSE Manager Tools 15:spacewalk-client-tools-4.3.21-150000.3.97.4 + openSUSE Leap 15.5:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 + openSUSE Leap 15.5:golang-github-prometheus-promu-0.16.0-150000.3.21.4 + openSUSE Leap 15.5:spacecmd-5.0.10-150000.3.127.3 + openSUSE Leap 15.5:wire-0.6.0-150000.1.17.4 + openSUSE Leap 15.6:golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 + openSUSE Leap 15.6:golang-github-prometheus-promu-0.16.0-150000.3.21.4 + openSUSE Leap 15.6:spacecmd-5.0.10-150000.3.127.3 + openSUSE Leap 15.6:wire-0.6.0-150000.1.17.4 + SUSE CaaS Platform 4.0:cni SUSE Enterprise Storage 7.1:cni No V5 entry found for CVE-2023-3976 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/3xxxx/CVE-2023-3976.json:No such file or directory skipping CVE-2023-3966 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3961 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3896 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3863 skipping CVE-2023-3867 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3866 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3865 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3824 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3823 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3776 skipping CVE-2023-3817 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3812 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3777 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3772 skipping CVE-2023-3773 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3758 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3750 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3740 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3740 skipping CVE-2023-3745 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3738 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3738 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3737 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3737 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3736 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3736 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3735 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3735 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3734 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3734 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3733 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3733 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3732 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3732 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3730 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3730 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3728 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3728 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3727 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3727 skipping CVE-2023-3649 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3648 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3640 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3611 skipping CVE-2023-3618 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3609 skipping CVE-2023-3610 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3603 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3600 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3567 skipping CVE-2023-3576 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3482 skipping CVE-2023-3446 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3439 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3436 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3422 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3422 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-3422 skipping CVE-2023-3428 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3421 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3421 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-3421 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3420 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3420 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-3420 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-3341 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3341 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2023-3341 skipping CVE-2023-3390 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3389 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3359 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3358 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3357 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3355 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3354 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3347 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3268 skipping CVE-2023-3326 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3316 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3312 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3301 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3297 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3269 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3247 skipping CVE-2023-3255 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3217 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3217 skipping CVE-2023-3220 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3216 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3216 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3215 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3215 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3214 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3214 skipping CVE-2023-3212 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3195 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3180 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3164 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3161 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3153 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3141 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3138 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3128 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3117 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3111 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3090 skipping CVE-2023-3108 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3106 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-3079 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-3079 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-3019 skipping CVE-2023-3044 as CVE page is older than CVRF-CVE file. skipping CVE-2023-3022 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2985 skipping CVE-2023-3006 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2977 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2953 skipping CVE-2023-2976 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2975 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2941 skipping CVE-2023-2952 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2940 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2939 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2938 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2937 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2936 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2935 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2934 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2933 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2932 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2931 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2930 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2929 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2906 skipping CVE-2023-2911 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2908 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2898 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2879 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2861 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2860 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2859 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2023-2801 skipping CVE-2023-2858 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2857 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2856 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2855 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2854 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2829 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2828 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2804 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2728 skipping CVE-2023-2731 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2727 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2726 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2726 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2725 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2725 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2724 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2724 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2723 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2723 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2722 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2722 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2721 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2721 skipping CVE-2023-2700 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2680 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2650 skipping CVE-2023-2664 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2663 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2662 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-2650.xml 2024-10-22 02:25:39.721683000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-2650.xml.new 2024-10-29 01:35:49.346738000 +0100 @@ -14,13 +14,13 @@ 1 - 136 - 2024-10-22T00:25:39Z + 137 + 2024-10-29T00:35:48Z current 2023-05-30T23:22:08Z - 2024-10-22T00:25:39Z + 2024-10-29T00:35:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3206,6 +3206,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python38-3.8.17-1.2 @@ -6743,6 +6761,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.17-1.2 as a component of openSUSE Tumbleweed @@ -8365,6 +8401,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.17-1.2 openSUSE Tumbleweed:python38-32bit-3.8.17-1.2 openSUSE Tumbleweed:python38-curses-3.8.17-1.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2610 skipping CVE-2023-2612 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2609 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2597 skipping CVE-2023-2603 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2602 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2598 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2593 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2513 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2468 skipping CVE-2023-2491 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2483 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2467 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2466 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2465 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2464 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2463 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2462 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2461 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2460 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2459 skipping CVE-2023-2455 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2454 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2426 skipping CVE-2023-2430 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2312 no cpe found for SUSE Package Hub 15 SP5 in CVE-2023-2312 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2312 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2283 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2255 skipping CVE-2023-2269 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2253 skipping CVE-2023-2248 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2236 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2235 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2222 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2203 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2023-2183 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2176 skipping CVE-2023-2177 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-2176.xml 2024-10-14 01:52:06.326164000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-2176.xml.new 2024-10-29 01:36:05.208912000 +0100 @@ -14,13 +14,13 @@ 1 - 97 - 2024-10-13T23:52:05Z + 98 + 2024-10-29T00:36:04Z current 2023-04-19T23:18:17Z - 2024-10-13T23:52:05Z + 2024-10-29T00:36:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3462,41 +3462,41 @@ ocfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.162.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -6827,18 +6827,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.162.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.162.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.162.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.162.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.162.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.162.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.162.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.162.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2162 skipping CVE-2023-2166 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2163 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2137 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2137 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2137 skipping CVE-2023-2157 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2156 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2136 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2136 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2135 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2135 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2134 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2134 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2133 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2133 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-2124 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-2033 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-2033 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-1999 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1999 skipping CVE-2023-2019 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2008 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2007 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2006 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2004 as CVE page is older than CVRF-CVE file. skipping CVE-2023-2002 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1990 skipping CVE-2023-1998 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1994 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1993 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1992 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1989 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1945 skipping CVE-2023-1981 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1972 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1916 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1906 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1859 skipping CVE-2023-1872 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1855 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1829 skipping CVE-2023-1838 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-1829.xml 2024-10-19 01:51:28.110533000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-1829.xml.new 2024-10-29 01:36:13.553972000 +0100 @@ -14,13 +14,13 @@ 1 - 147 - 2024-10-18T23:51:27Z + 148 + 2024-10-29T00:36:12Z current 2023-04-12T23:15:34Z - 2024-10-18T23:51:27Z + 2024-10-29T00:36:12Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3050,12 +3050,21 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1 @@ -3110,12 +3119,21 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 @@ -3440,9 +3458,15 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-1-8.3.1 @@ -7262,6 +7286,30 @@ suse-module-tools-scriptlets-16.0.36-1.1 as a component of openSUSE Tumbleweed + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + kernel-default as a component of SUSE Linux Enterprise Server 11 SP3 for Teradata @@ -7403,18 +7451,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -8797,6 +8833,16 @@ openSUSE Tumbleweed:suse-module-tools-16.0.36-1.1 openSUSE Tumbleweed:suse-module-tools-scriptlets-16.0.36-1.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Server 11 SP3 for Teradata:kernel-default SUSE Linux Enterprise Server 11 SP3 for Teradata:kernel-source @@ -8826,10 +8872,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE OpenStack Cloud 9:kernel-default SUSE OpenStack Cloud 9:kernel-default-base no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1823 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1822 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1821 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1820 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1819 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1818 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1817 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1816 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1815 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1814 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1813 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1812 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1811 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1810 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1786 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1729 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1667 skipping CVE-2023-1670 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1668 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1637 skipping CVE-2023-1652 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1611 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1601 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1583 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1582 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1579 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1534 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1534 skipping CVE-2023-1544 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1533 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1533 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1532 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1532 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1531 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1531 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1530 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1530 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1529 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1529 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1528 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1528 No V5 entry found for CVE-2023-1521 / /home/securitybot/prod/cve-database/cvelistV5/cves/2023/1xxxx/CVE-2023-1521.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1521 skipping CVE-2023-1513 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1476 as CVE page is older than CVRF-CVE file. CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2023-1410: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2023-1410: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2023-1410: no packages for SUSE Enterprise Storage 7, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2023-1410: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2023-1410: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2023-1410: no packages for SUSE Enterprise Storage 7, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2023-1410: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-1410: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2023-1410: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2023-1410: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2023-1410: no packages for SUSE Enterprise Storage 7, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2023-1410: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2023-1410: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2023-1410: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-1410: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2023-1387: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2023-1387: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2023-1387: no packages for SUSE Enterprise Storage 7, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2023-1387: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2023-1387: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2023-1387: no packages for SUSE Enterprise Storage 7, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2023-1387: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-1387: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2023-1387: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2023-1387: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2023-1387: no packages for SUSE Enterprise Storage 7, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2023-1387: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2023-1387: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2023-1387: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-1387: no packages for SUSE Manager Tools for SLE Micro 5, but entry? skipping CVE-2023-1393 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1390 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1355 skipping CVE-2023-1382 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1380 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1350 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1264 skipping CVE-2023-1295 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1289 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1281 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1236 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1236 skipping CVE-2023-1255 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1252 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1249 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1235 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1235 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1234 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1234 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1233 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1233 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1232 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1232 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1231 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1231 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1230 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1230 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1229 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1229 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1228 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1228 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1227 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1227 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1226 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1226 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1225 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1225 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1224 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1224 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1223 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1223 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1222 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1222 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1221 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1221 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1220 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1220 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1219 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1219 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1218 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1218 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1217 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1217 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1216 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1216 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1215 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1215 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1214 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1214 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-1213 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-1213 skipping CVE-2023-1206 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1195 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1194 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1193 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1192 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1127 skipping CVE-2023-1161 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1118 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1095 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1077 skipping CVE-2023-1079 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1078 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1076 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1075 as CVE page is older than CVRF-CVE file. skipping CVE-2023-1074 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1018 skipping CVE-2023-1032 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-1017 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0950 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0941 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0941 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0933 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0933 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0932 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0932 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0931 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0931 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0930 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0930 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0929 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0929 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0928 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0928 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0927 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0927 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0922 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0778 skipping CVE-2023-0804 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0803 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0802 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0801 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0800 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0799 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0798 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0797 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0796 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0795 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0705 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0705 skipping CVE-2023-0767 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0704 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0704 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0703 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0703 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0702 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0702 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0701 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0701 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0700 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0700 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0699 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0699 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0698 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0698 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0697 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0697 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0696 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0696 skipping CVE-2023-0687 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0662 skipping CVE-2023-0668 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0667 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0666 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0664 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2023-0594 skipping CVE-2023-0616 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0615 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0614 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0597 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0590 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0568 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0567 CVE-2023-0507: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-0507: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2023-0507: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0494 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0474 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0474 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0473 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0473 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0472 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0472 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0471 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2023-0471 skipping CVE-2023-0469 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0468 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0466 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0465 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0464 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0461 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0459 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0458 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0433 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0394 skipping CVE-2023-0417 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0416 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0415 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0414 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0413 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0412 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0411 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0401 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0341 skipping CVE-2023-0386 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0361 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0330 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2023-0286 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0286 skipping CVE-2023-0288 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-0286.xml 2024-10-22 02:30:03.404835000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2023-0286.xml.new 2024-10-29 01:37:03.174872000 +0100 @@ -14,13 +14,13 @@ 1 - 127 - 2024-10-22T00:30:02Z + 128 + 2024-10-29T00:37:02Z current 2023-02-08T00:24:04Z - 2024-10-22T00:30:02Z + 2024-10-29T00:37:02Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2805,6 +2805,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python38-3.8.17-1.2 @@ -5967,6 +5985,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.17-1.2 as a component of openSUSE Tumbleweed @@ -7316,6 +7352,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.17-1.2 openSUSE Tumbleweed:python38-32bit-3.8.17-1.2 openSUSE Tumbleweed:python38-curses-3.8.17-1.2 skipping CVE-2023-0266 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0241 skipping CVE-2023-0240 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0225 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0217 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0216 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0215 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0210 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2023-0160 skipping CVE-2023-0179 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0141 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0140 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0139 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0138 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0137 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0136 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0134 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0133 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0132 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0131 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0130 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0129 no cpe found for SUSE Package Hub 15 SP4 in CVE-2023-0128 skipping CVE-2023-0122 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0054 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0051 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0049 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0045 as CVE page is older than CVRF-CVE file. skipping CVE-2023-0030 as CVE page is older than CVRF-CVE file. no entry found for CVE-2022-219862 / /home/securitybot/prod/cve-database/cvelist/2022/219xxxx/CVE-2022-219862.json:No such file or directory No V5 entry found for CVE-2022-219862 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/219xxxx/CVE-2022-219862.json:No such file or directory --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-49015.xml 2024-10-23 01:29:01.753772000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-49015.xml.new 2024-10-29 01:37:22.408881000 +0100 @@ -14,13 +14,13 @@ 1 - 2 - 2024-10-22T23:29:01Z + 3 + 2024-10-29T00:37:21Z current 2024-10-22T00:30:55Z - 2024-10-22T23:29:01Z + 2024-10-29T00:37:21Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -64,11 +64,6 @@ SUSE Linux Enterprise High Availability Extension 12 SP5 - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -201,35 +196,17 @@ SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise Server 12 SP2-LTSS - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - SUSE Linux Enterprise Server 12 SP4-LTSS - - SUSE Linux Enterprise Module for Public Cloud 12 - SUSE Linux Enterprise Server 12 SP5 @@ -307,25 +284,7 @@ SUSE Linux Enterprise Server Teradata 15 SP4 - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - - SUSE Linux Enterprise Module for Public Cloud 12 - - - - SUSE Linux Enterprise Module for Public Cloud 12 - SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -764,12 +723,6 @@ kernel-source as a component of SUSE Linux Enterprise Module for Development Tools 15 SP6 - - kernel-default as a component of SUSE Linux Enterprise Module for Public Cloud 12 - - - kernel-source as a component of SUSE Linux Enterprise Module for Public Cloud 12 - kernel-devel-azure as a component of SUSE Linux Enterprise Module for Public Cloud 15 SP5 skipping CVE-2022-49001 as CVE page is older than CVRF-CVE file. skipping CVE-2022-49000 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48999 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48998 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48994 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48991 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48988 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48987 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48986 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48985 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48949 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48948 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48945 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48945.xml 2024-10-20 01:49:55.065627000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48945.xml.new 2024-10-29 01:37:48.214026000 +0100 @@ -14,13 +14,13 @@ 1 - 12 - 2024-10-19T23:49:54Z + 13 + 2024-10-29T00:37:47Z current 2024-09-23T23:49:08Z - 2024-10-19T23:49:54Z + 2024-10-29T00:37:47Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -139,6 +139,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1499,6 +1514,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3121,6 +3169,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.136.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48943 skipping CVE-2022-48944 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48943.xml 2024-10-20 01:49:56.594534000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48943.xml.new 2024-10-29 01:37:48.925989000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-19T23:49:56Z + 27 + 2024-10-29T00:37:48Z current 2024-08-22T23:38:31Z - 2024-10-19T23:49:56Z + 2024-10-29T00:37:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -131,6 +131,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1377,6 +1392,39 @@ kernel-rt-5.14.21-150500.13.67.3 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.160 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2830,6 +2878,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.133.2 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.184:kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 Container suse/sle-micro/rt-5.5:2.0.4-4.5.160:kernel-rt-5.14.21-150500.13.67.3 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48938 skipping CVE-2022-48942 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48941 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48940 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48939 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48938.xml 2024-10-20 01:49:59.373888000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48938.xml.new 2024-10-29 01:37:49.786943000 +0100 @@ -14,13 +14,13 @@ 1 - 22 - 2024-10-19T23:49:58Z + 23 + 2024-10-29T00:37:49Z current 2024-08-22T23:38:32Z - 2024-10-19T23:49:58Z + 2024-10-29T00:37:49Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -110,6 +110,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1373,6 +1388,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2663,18 +2711,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -2808,6 +2844,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 @@ -3177,10 +3224,6 @@ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source-azure SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source openSUSE Leap 15.6:cluster-md-kmp-default openSUSE Leap 15.6:dlm-kmp-default no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48931 skipping CVE-2022-48937 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48936 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48935 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48934 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48933 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48932 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48931.xml 2024-10-20 01:50:03.479675000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48931.xml.new 2024-10-29 01:37:50.737909000 +0100 @@ -14,13 +14,13 @@ 1 - 21 - 2024-10-19T23:50:03Z + 22 + 2024-10-29T00:37:50Z current 2024-08-22T23:38:34Z - 2024-10-19T23:50:03Z + 2024-10-29T00:37:50Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -130,6 +130,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1368,6 +1383,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2607,18 +2655,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -2772,6 +2808,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 @@ -3130,10 +3177,6 @@ SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-devel-azure SUSE Linux Enterprise Module for Public Cloud 15 SP6:kernel-source-azure SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source openSUSE Leap 15.6:cluster-md-kmp-default openSUSE Leap 15.6:dlm-kmp-default no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48930 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48930.xml 2024-10-20 01:50:04.080631000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48930.xml.new 2024-10-29 01:37:51.678882000 +0100 @@ -14,13 +14,13 @@ 1 - 23 - 2024-10-19T23:50:03Z + 24 + 2024-10-29T00:37:51Z current 2024-08-22T23:38:35Z - 2024-10-19T23:50:03Z + 2024-10-29T00:37:51Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -119,6 +119,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1447,6 +1462,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2896,18 +2944,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3038,6 +3074,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 @@ -3486,10 +3533,6 @@ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48925 skipping CVE-2022-48929 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48928 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48927 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48926 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48925.xml 2024-10-20 01:50:07.225489000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48925.xml.new 2024-10-29 01:37:52.533813000 +0100 @@ -14,13 +14,13 @@ 1 - 22 - 2024-10-19T23:50:06Z + 23 + 2024-10-29T00:37:51Z current 2024-08-22T23:38:36Z - 2024-10-19T23:50:06Z + 2024-10-29T00:37:51Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -165,6 +165,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1565,6 +1580,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3113,18 +3161,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3279,6 +3315,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 skipping CVE-2022-48924 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48923 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48922 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48921 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48920.xml 2024-10-16 01:54:31.824542000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48920.xml.new 2024-10-29 01:37:53.545762000 +0100 @@ -14,13 +14,13 @@ 1 - 20 - 2024-10-15T23:54:31Z + 21 + 2024-10-29T00:37:52Z current 2024-08-22T23:38:37Z - 2024-10-15T23:54:31Z + 2024-10-29T00:37:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -158,6 +158,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1322,6 +1337,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -2635,6 +2683,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48919 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48919.xml 2024-10-20 01:50:10.678786000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48919.xml.new 2024-10-29 01:37:54.384711000 +0100 @@ -14,13 +14,13 @@ 1 - 27 - 2024-10-19T23:50:10Z + 28 + 2024-10-29T00:37:53Z current 2024-08-22T23:38:37Z - 2024-10-19T23:50:10Z + 2024-10-29T00:37:53Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -185,6 +185,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1637,6 +1652,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3248,18 +3296,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3430,6 +3466,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 @@ -3939,10 +3986,6 @@ SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default SUSE Linux Enterprise Server Teradata 15 SP4:kernel-source-azure SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48911 skipping CVE-2022-48918 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48917 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48916 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48915 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48914 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48913 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48912 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48911.xml 2024-10-20 01:50:15.847547000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48911.xml.new 2024-10-29 01:37:55.486119000 +0100 @@ -14,13 +14,13 @@ 1 - 13 - 2024-10-19T23:50:15Z + 14 + 2024-10-29T00:37:54Z current 2024-08-22T23:38:40Z - 2024-10-19T23:50:15Z + 2024-10-29T00:37:54Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -123,6 +123,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1478,6 +1493,39 @@ kernel-rt-5.14.21-150500.13.73.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.211 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.136.1 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -3033,6 +3081,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.136.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.197:kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.211:kernel-rt-5.14.21-150500.13.73.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.136.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.136.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48910.xml 2024-10-16 01:54:33.790472000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48910.xml.new 2024-10-29 01:37:56.333084000 +0100 @@ -14,13 +14,13 @@ 1 - 20 - 2024-10-15T23:54:33Z + 21 + 2024-10-29T00:37:55Z current 2024-08-22T23:38:40Z - 2024-10-15T23:54:33Z + 2024-10-29T00:37:55Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -129,6 +129,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1293,6 +1308,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -2577,6 +2625,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48905 skipping CVE-2022-48909 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48908 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48907 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48906 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48905.xml 2024-10-20 01:50:19.051901000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48905.xml.new 2024-10-29 01:37:57.045062000 +0100 @@ -14,13 +14,13 @@ 1 - 21 - 2024-10-19T23:50:18Z + 22 + 2024-10-29T00:37:56Z current 2024-08-22T23:38:41Z - 2024-10-19T23:50:18Z + 2024-10-29T00:37:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -117,6 +117,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1450,6 +1465,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2905,18 +2953,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3045,6 +3081,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 @@ -3495,10 +3542,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48899 skipping CVE-2022-48904 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48903 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48902 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48901 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48900 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48899.xml 2024-10-20 01:50:22.254686000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48899.xml.new 2024-10-29 01:37:57.966994000 +0100 @@ -14,13 +14,13 @@ 1 - 22 - 2024-10-19T23:50:21Z + 23 + 2024-10-29T00:37:57Z current 2024-08-21T23:44:09Z - 2024-10-19T23:50:21Z + 2024-10-29T00:37:57Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -100,6 +100,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1361,6 +1376,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2660,18 +2708,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -2795,6 +2831,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 @@ -3163,10 +3210,6 @@ SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-default SUSE Linux Enterprise Server 11 SP4 LTSS:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source openSUSE Leap 15.6:cluster-md-kmp-default openSUSE Leap 15.6:dlm-kmp-default no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48896 skipping CVE-2022-48898 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48897 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48896.xml 2024-10-20 01:50:24.027599000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48896.xml.new 2024-10-29 01:37:58.960948000 +0100 @@ -14,13 +14,13 @@ 1 - 19 - 2024-10-19T23:50:23Z + 20 + 2024-10-29T00:37:58Z current 2024-08-21T23:44:11Z - 2024-10-19T23:50:23Z + 2024-10-29T00:37:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -100,6 +100,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1343,6 +1358,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2588,18 +2636,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -2723,6 +2759,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 @@ -3106,10 +3153,6 @@ SUSE Linux Enterprise Server Teradata 12 SP3:kernel-default SUSE Linux Enterprise Server Teradata 12 SP3:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source openSUSE Leap 15.6:cluster-md-kmp-default openSUSE Leap 15.6:dlm-kmp-default no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48875 skipping CVE-2022-48895 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48894 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48893 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48892 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48891 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48890 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48889 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48888 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48887 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48886 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48885 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48884 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48883 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48882 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48881 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48880 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48879 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48878 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48877 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48876 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48875.xml 2024-10-20 01:50:33.786609000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48875.xml.new 2024-10-29 01:37:59.714992000 +0100 @@ -14,13 +14,13 @@ 1 - 23 - 2024-10-19T23:50:33Z + 24 + 2024-10-29T00:37:59Z current 2024-08-21T23:44:18Z - 2024-10-19T23:50:33Z + 2024-10-29T00:37:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -159,6 +159,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -1420,6 +1435,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-5.14.21-150400.24.133.2 as a component of Image SLES15-SP4-SAP-Azure-LI-BYOS @@ -2895,6 +2943,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-SAP-Azure-LI-BYOS:cluster-md-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:dlm-kmp-default-5.14.21-150400.24.133.2 Image SLES15-SP4-SAP-Azure-LI-BYOS:gfs2-kmp-default-5.14.21-150400.24.133.2 skipping CVE-2022-48874 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48873 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48872 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48871 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48870 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48869 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48868 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48867 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48866 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48865.xml 2024-10-16 01:54:39.536647000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48865.xml.new 2024-10-29 01:38:00.424919000 +0100 @@ -14,13 +14,13 @@ 1 - 22 - 2024-10-15T23:54:39Z + 23 + 2024-10-29T00:38:00Z current 2024-07-17T23:31:11Z - 2024-10-15T23:54:39Z + 2024-10-29T00:38:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -140,6 +140,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1319,6 +1334,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.66.1 as a component of Image SLES15-SP5-Azure-Basic @@ -2656,6 +2704,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.66.1 Image SLES15-SP5-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150500.55.80.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48863 skipping CVE-2022-48864 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48863.xml 2024-10-20 01:50:41.345685000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48863.xml.new 2024-10-29 01:38:01.211825000 +0100 @@ -14,13 +14,13 @@ 1 - 34 - 2024-10-19T23:50:40Z + 35 + 2024-10-29T00:38:00Z current 2024-07-17T23:31:11Z - 2024-10-19T23:50:40Z + 2024-10-29T00:38:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -118,6 +118,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1776,6 +1791,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3724,6 +3772,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48860 skipping CVE-2022-48862 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48861 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48860.xml 2024-10-20 01:50:43.519569000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48860.xml.new 2024-10-29 01:38:02.180797000 +0100 @@ -14,13 +14,13 @@ 1 - 34 - 2024-10-19T23:50:43Z + 35 + 2024-10-29T00:38:01Z current 2024-07-17T23:31:12Z - 2024-10-19T23:50:43Z + 2024-10-29T00:38:01Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -116,6 +116,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1769,6 +1784,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3712,6 +3760,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48857 skipping CVE-2022-48859 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48858 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48857.xml 2024-10-20 01:50:45.955446000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48857.xml.new 2024-10-29 01:38:02.945762000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-19T23:50:45Z + 39 + 2024-10-29T00:38:02Z current 2024-07-17T23:31:13Z - 2024-10-19T23:50:45Z + 2024-10-29T00:38:02Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -174,6 +174,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1889,6 +1904,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3839,18 +3887,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4034,6 +4070,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2022-48856 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48855.xml 2024-10-16 01:54:40.269588000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48855.xml.new 2024-10-29 01:38:03.596693000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-15T23:54:39Z + 30 + 2024-10-29T00:38:03Z current 2024-07-17T23:31:13Z - 2024-10-15T23:54:39Z + 2024-10-29T00:38:03Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -164,6 +164,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1534,6 +1549,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3118,6 +3166,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2022-48854 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48853 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48852 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48851 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48850.xml 2024-10-16 01:54:43.883453000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48850.xml.new 2024-10-29 01:38:04.211673000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-15T23:54:43Z + 32 + 2024-10-29T00:38:03Z current 2024-07-17T23:31:14Z - 2024-10-15T23:54:43Z + 2024-10-29T00:38:03Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -140,6 +140,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1531,6 +1546,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3106,6 +3154,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2022-48849 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48848 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48847 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48846 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48845 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48844.xml 2024-10-17 01:40:42.884956000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48844.xml.new 2024-10-29 01:38:04.836147000 +0100 @@ -14,13 +14,13 @@ 1 - 26 - 2024-10-16T23:40:42Z + 27 + 2024-10-29T00:38:04Z current 2024-07-17T23:31:15Z - 2024-10-16T23:40:42Z + 2024-10-29T00:38:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -82,6 +82,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP5-Azure-Basic @@ -1421,6 +1436,39 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-azure-5.14.21-150500.33.63.1 as a component of Image SLES15-SP5-Azure-Basic @@ -2907,6 +2955,17 @@ Container bci/bci-sle15-kernel-module-devel:15.5.22.2:kernel-syms-5.14.21-150500.55.73.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP5-Azure-Basic:kernel-azure-5.14.21-150500.33.63.1 Image SLES15-SP5-Azure-Standard:kernel-azure-5.14.21-150500.33.63.1 Image SLES15-SP5-BYOS-Azure:kernel-default-5.14.21-150500.55.73.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48839 skipping CVE-2022-48843 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48842 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48841 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48840 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48839.xml 2024-10-20 01:50:56.127934000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48839.xml.new 2024-10-29 01:38:05.523113000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-19T23:50:55Z + 37 + 2024-10-29T00:38:05Z current 2024-07-17T23:31:16Z - 2024-10-19T23:50:55Z + 2024-10-29T00:38:05Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -193,6 +193,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1791,6 +1806,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3879,18 +3927,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4067,6 +4103,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 @@ -4765,10 +4812,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48836 skipping CVE-2022-48838 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48837 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48836.xml 2024-10-20 01:50:58.280793000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48836.xml.new 2024-10-29 01:38:06.177119000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-19T23:50:57Z + 38 + 2024-10-29T00:38:05Z current 2024-07-17T23:31:17Z - 2024-10-19T23:50:57Z + 2024-10-29T00:38:05Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -151,6 +151,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1931,6 +1946,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3941,18 +3989,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4109,6 +4145,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 @@ -4732,10 +4779,6 @@ SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48829 skipping CVE-2022-48835 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48834 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48833 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48832 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48831 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48830 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48829.xml 2024-10-20 01:51:02.605595000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48829.xml.new 2024-10-29 01:38:06.879089000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-19T23:51:02Z + 29 + 2024-10-29T00:38:06Z current 2024-07-17T23:31:19Z - 2024-10-19T23:51:02Z + 2024-10-29T00:38:06Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -124,6 +124,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1757,6 +1772,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3509,18 +3557,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3666,6 +3702,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 @@ -4252,10 +4299,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48828 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48828.xml 2024-10-20 01:51:03.280550000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48828.xml.new 2024-10-29 01:38:07.604034000 +0100 @@ -14,13 +14,13 @@ 1 - 33 - 2024-10-19T23:51:02Z + 34 + 2024-10-29T00:38:07Z current 2024-07-17T23:31:19Z - 2024-10-19T23:51:02Z + 2024-10-29T00:38:07Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -122,6 +122,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1775,6 +1790,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3724,6 +3772,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48827 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48827.xml 2024-10-20 01:51:04.015528000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48827.xml.new 2024-10-29 01:38:08.368959000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-19T23:51:03Z + 37 + 2024-10-29T00:38:07Z current 2024-07-17T23:31:19Z - 2024-10-19T23:51:03Z + 2024-10-29T00:38:07Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -150,6 +150,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1865,6 +1880,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3815,18 +3863,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3986,6 +4022,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48826 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48826.xml 2024-10-20 01:51:04.809463000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48826.xml.new 2024-10-29 01:38:09.303908000 +0100 @@ -14,13 +14,13 @@ 1 - 29 - 2024-10-19T23:51:04Z + 30 + 2024-10-29T00:38:08Z current 2024-07-16T23:43:13Z - 2024-10-19T23:51:04Z + 2024-10-29T00:38:08Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -167,6 +167,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1781,6 +1796,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3509,18 +3557,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3709,6 +3745,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48823 skipping CVE-2022-48825 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48824 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48823.xml 2024-10-20 01:51:07.010869000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48823.xml.new 2024-10-29 01:38:10.256845000 +0100 @@ -14,13 +14,13 @@ 1 - 41 - 2024-10-19T23:51:06Z + 42 + 2024-10-29T00:38:09Z current 2024-07-17T23:31:21Z - 2024-10-19T23:51:06Z + 2024-10-29T00:38:09Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -164,6 +164,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1878,6 +1893,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4043,6 +4091,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48822 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48822.xml 2024-10-20 01:51:07.818799000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48822.xml.new 2024-10-29 01:38:11.367787000 +0100 @@ -14,13 +14,13 @@ 1 - 33 - 2024-10-19T23:51:07Z + 34 + 2024-10-29T00:38:10Z current 2024-07-17T23:31:21Z - 2024-10-19T23:51:07Z + 2024-10-29T00:38:10Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -148,6 +148,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP3-BYOS-EC2-HVM @@ -1950,6 +1965,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.3.18-150300.59.170.1 as a component of Image SLES15-SP3-BYOS-EC2-HVM @@ -4002,18 +4050,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4167,6 +4203,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.170.1 Image SLES15-SP3-CHOST-BYOS-Aliyun:kernel-default-5.3.18-150300.59.170.1 Image SLES15-SP3-CHOST-BYOS-Azure:kernel-default-5.3.18-150300.59.170.1 @@ -4853,10 +4900,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48811 skipping CVE-2022-48821 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48820 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48819 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48818 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48817 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48816 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48815 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48814 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48813 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48812 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48811.xml 2024-10-20 01:51:15.311908000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48811.xml.new 2024-10-29 01:38:12.153753000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-19T23:51:14Z + 41 + 2024-10-29T00:38:11Z current 2024-07-16T23:43:16Z - 2024-10-19T23:51:14Z + 2024-10-29T00:38:11Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -169,6 +169,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1878,6 +1893,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4045,6 +4093,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48810.xml 2024-10-17 01:40:46.634630000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48810.xml.new 2024-10-29 01:38:12.921728000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-16T23:40:46Z + 32 + 2024-10-29T00:38:12Z current 2024-07-16T23:43:16Z - 2024-10-16T23:40:46Z + 2024-10-29T00:38:12Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -142,6 +142,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1533,6 +1548,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3110,6 +3158,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48805 skipping CVE-2022-48809 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48808 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48807 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48806 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48805.xml 2024-10-20 01:51:18.799741000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48805.xml.new 2024-10-29 01:38:13.715725000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-19T23:51:18Z + 37 + 2024-10-29T00:38:13Z current 2024-07-16T23:43:17Z - 2024-10-19T23:51:18Z + 2024-10-29T00:38:13Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -148,6 +148,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1951,6 +1966,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4009,18 +4057,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4156,6 +4192,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 @@ -4844,10 +4891,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48804 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48804.xml 2024-10-20 01:51:19.498715000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48804.xml.new 2024-10-29 01:38:14.748153000 +0100 @@ -14,13 +14,13 @@ 1 - 34 - 2024-10-19T23:51:19Z + 35 + 2024-10-29T00:38:14Z current 2024-07-16T23:43:18Z - 2024-10-19T23:51:19Z + 2024-10-29T00:38:14Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -125,6 +125,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1848,6 +1863,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3859,6 +3907,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48799 skipping CVE-2022-48803 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48802 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48801 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48800 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48799.xml 2024-10-20 01:51:23.378499000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48799.xml.new 2024-10-29 01:38:15.811079000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-19T23:51:22Z + 32 + 2024-10-29T00:38:15Z current 2024-07-16T23:43:19Z - 2024-10-19T23:51:22Z + 2024-10-29T00:38:15Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -110,6 +110,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1713,6 +1728,39 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -3610,6 +3658,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48794 skipping CVE-2022-48798 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48797 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48796 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48795 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48794.xml 2024-10-20 01:51:26.441846000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48794.xml.new 2024-10-29 01:38:16.837042000 +0100 @@ -14,13 +14,13 @@ 1 - 28 - 2024-10-19T23:51:26Z + 29 + 2024-10-29T00:38:16Z current 2024-07-17T23:31:29Z - 2024-10-19T23:51:26Z + 2024-10-29T00:38:16Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -126,6 +126,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1738,6 +1753,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3475,18 +3523,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3634,6 +3670,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 @@ -4215,10 +4262,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel notsure where Teradata 12-SP3 LTSS Extension is contained? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48792 skipping CVE-2022-48793 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48792.xml 2024-10-20 01:51:27.812779000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48792.xml.new 2024-10-29 01:38:17.824949000 +0100 @@ -14,13 +14,13 @@ 1 - 35 - 2024-10-19T23:51:27Z + 36 + 2024-10-29T00:38:17Z current 2024-07-17T23:31:29Z - 2024-10-19T23:51:27Z + 2024-10-29T00:38:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -148,6 +148,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2056,6 +2071,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4180,18 +4228,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4315,6 +4351,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48791 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48791.xml 2024-10-20 01:51:28.508714000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48791.xml.new 2024-10-29 01:38:18.992938000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-19T23:51:28Z + 39 + 2024-10-29T00:38:18Z current 2024-07-17T23:31:29Z - 2024-10-19T23:51:28Z + 2024-10-29T00:38:18Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -130,6 +130,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1912,6 +1927,39 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -4007,6 +4055,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48790 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48790.xml 2024-10-20 01:51:29.192680000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48790.xml.new 2024-10-29 01:38:19.755867000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-19T23:51:28Z + 39 + 2024-10-29T00:38:19Z current 2024-07-16T23:43:19Z - 2024-10-19T23:51:28Z + 2024-10-29T00:38:19Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -135,6 +135,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1813,6 +1828,39 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -3778,18 +3826,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3948,6 +3984,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48789 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48789.xml 2024-10-20 01:51:29.963649000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48789.xml.new 2024-10-29 01:38:20.575837000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-19T23:51:29Z + 37 + 2024-10-29T00:38:20Z current 2024-07-17T23:31:30Z - 2024-10-19T23:51:29Z + 2024-10-29T00:38:20Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -118,6 +118,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1796,6 +1811,39 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -3761,18 +3809,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3914,6 +3950,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48788 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48788.xml 2024-10-20 01:51:30.672601000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48788.xml.new 2024-10-29 01:38:21.500805000 +0100 @@ -14,13 +14,13 @@ 1 - 37 - 2024-10-19T23:51:30Z + 38 + 2024-10-29T00:38:20Z current 2024-07-16T23:43:20Z - 2024-10-19T23:51:30Z + 2024-10-29T00:38:20Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -118,6 +118,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1801,6 +1816,39 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.134 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -3904,6 +3952,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.128.1 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.128:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 Container suse/sle-micro/rt-5.5:2.0.4-4.5.134:kernel-rt-5.14.21-150500.13.64.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48786 skipping CVE-2022-48787 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48786.xml 2024-10-20 01:51:32.058536000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48786.xml.new 2024-10-29 01:38:22.394729000 +0100 @@ -14,13 +14,13 @@ 1 - 32 - 2024-10-19T23:51:31Z + 33 + 2024-10-29T00:38:21Z current 2024-07-17T23:31:32Z - 2024-10-19T23:51:31Z + 2024-10-29T00:38:21Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -119,6 +119,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1735,6 +1750,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -3644,6 +3692,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48775 skipping CVE-2022-48785 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48784 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48783 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48782 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48781 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48780 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48779 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48778 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48777 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48776 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48775.xml 2024-10-20 01:51:38.284704000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48775.xml.new 2024-10-29 01:38:23.240677000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-19T23:51:37Z + 37 + 2024-10-29T00:38:22Z current 2024-07-16T23:43:23Z - 2024-10-19T23:51:37Z + 2024-10-29T00:38:22Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -133,6 +133,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1848,6 +1863,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3798,18 +3846,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3952,6 +3988,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2022-48774 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48773 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48769 skipping CVE-2022-48771 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48770 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48769.xml 2024-10-20 01:51:41.890511000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48769.xml.new 2024-10-29 01:38:24.571137000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-19T23:51:41Z + 39 + 2024-10-29T00:38:24Z current 2024-06-20T23:31:36Z - 2024-10-19T23:51:41Z + 2024-10-29T00:38:24Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -126,6 +126,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1747,6 +1762,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -3666,6 +3714,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48751 skipping CVE-2022-48768 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48767 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48766 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48765 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48764 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48763 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48762 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48761 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48760 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48759 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48758 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48757 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48756 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48755 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48754 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48753 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48752 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48751.xml 2024-10-20 01:51:52.420459000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48751.xml.new 2024-10-29 01:38:25.511087000 +0100 @@ -14,13 +14,13 @@ 1 - 39 - 2024-10-19T23:51:52Z + 40 + 2024-10-29T00:38:24Z current 2024-06-20T23:31:37Z - 2024-10-19T23:51:52Z + 2024-10-29T00:38:24Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -129,6 +129,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-CHOST-BYOS @@ -1750,6 +1765,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.128.1 as a component of Image SLES15-SP4-CHOST-BYOS @@ -3672,6 +3720,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-CHOST-BYOS:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Aliyun:kernel-default-5.14.21-150400.24.128.1 Image SLES15-SP4-CHOST-BYOS-Azure:kernel-default-5.14.21-150400.24.128.1 skipping CVE-2022-48750 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48749 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48748 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48747 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48746 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48745 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48744 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48743 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48742 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48741 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48740 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48739 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48738 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48737 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48736 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48735 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48734 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48729 skipping CVE-2022-48732 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48731 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48730 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48729.xml 2024-10-20 01:52:05.794781000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48729.xml.new 2024-10-29 01:38:26.951976000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-19T23:52:05Z + 32 + 2024-10-29T00:38:26Z current 2024-06-21T23:31:52Z - 2024-10-19T23:52:05Z + 2024-10-29T00:38:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3186,24 +3186,9 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3911,11 +3896,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48701 skipping CVE-2022-48728 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48727 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48726 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48725 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48724 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48723 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48722 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48721 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48720 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48719 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48718 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48717 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48716 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48715 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48714 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48713 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48712 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48711 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48710 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48709 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48708 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48707 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48706 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48705 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48704 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48703 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48702 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48686 skipping CVE-2022-48700 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48699 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48698 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48697 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48696 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48695 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48694 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48693 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48692 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48691 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48690 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48689 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48688 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48687 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48662 skipping CVE-2022-48675 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48674 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48673 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48672 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48671 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48670 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48669 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48668 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48667 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48666 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48665 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48664 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48663 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48662.xml 2024-10-22 02:33:48.373548000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48662.xml.new 2024-10-29 01:38:28.967889000 +0100 @@ -14,13 +14,13 @@ 1 - 52 - 2024-10-22T00:33:47Z + 53 + 2024-10-29T00:38:28Z current 2024-04-29T23:27:50Z - 2024-10-22T00:33:47Z + 2024-10-29T00:38:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1680,15 +1680,24 @@ kernel-livepatch-5_14_21-150400_24_103-default-9-150400.2.2 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1 @@ -1725,15 +1734,24 @@ kernel-livepatch-5_14_21-150500_13_30-rt-10-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_52-rt-1-150500.11.5.1 @@ -1758,15 +1776,24 @@ kernel-livepatch-5_14_21-150500_55_44-default-10-150500.2.2 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2 @@ -3459,6 +3486,33 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Enterprise Storage 7.1 @@ -4474,6 +4528,17 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 + + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Enterprise Storage 7.1:kernel-default SUSE Enterprise Storage 7.1:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48660 skipping CVE-2022-48661 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48651 skipping CVE-2022-48659 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48658 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48657 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48656 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48655 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48654 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48653 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48652 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48651.xml 2024-10-17 01:41:16.134590000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-48651.xml.new 2024-10-29 01:38:30.911783000 +0100 @@ -14,13 +14,13 @@ 1 - 71 - 2024-10-16T23:41:15Z + 72 + 2024-10-29T00:38:30Z current 2024-04-29T23:27:52Z - 2024-10-16T23:41:15Z + 2024-10-29T00:38:30Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2462,15 +2462,24 @@ kernel-livepatch-5_14_21-150400_24_103-default-5-150400.2.1 + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_108-default-9-150400.9.8.1 kernel-livepatch-5_14_21-150400_24_111-default-7-150400.9.6.1 + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_116-default-7-150400.9.8.1 + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1 @@ -2522,15 +2531,24 @@ kernel-livepatch-5_14_21-150500_13_30-rt-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_13_35-rt-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_13_38-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_47-rt-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_5-rt-12-150500.2.1 @@ -2561,15 +2579,24 @@ kernel-livepatch-5_14_21-150500_55_44-default-6-150500.2.1 + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + kernel-livepatch-5_14_21-150500_55_49-default-9-150500.11.8.1 kernel-livepatch-5_14_21-150500_55_52-default-7-150500.11.6.1 + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_59-default-7-150500.11.10.1 + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + kernel-livepatch-5_14_21-150500_55_62-default-1-150500.11.3.2 @@ -2609,9 +2636,15 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-1-150200.5.3.1 @@ -2648,9 +2681,15 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1 @@ -2891,6 +2930,9 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-1-8.3.1 @@ -5465,6 +5507,48 @@ kernel-rt-5.14.21-150500.13.52.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -6589,6 +6673,22 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.52.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48624 skipping CVE-2022-48650 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48649 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48648 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48647 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48646 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48645 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48644 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48643 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48642 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48641 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48640 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48639 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48638 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48637 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48636 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48635 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48634 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48633 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48632 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48631 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48630 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48629 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48628 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48627 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48626 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-48620 skipping CVE-2022-48622 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48619 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48566 skipping CVE-2022-48565 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48564 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48560 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48554 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48522 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48503 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48468 skipping CVE-2022-48502 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48434 skipping CVE-2022-48425 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48424 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48423 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48279 skipping CVE-2022-48339 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48338 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48337 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48303 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48281 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-48258 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-48257 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-48174 skipping CVE-2022-48065 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48064 as CVE page is older than CVRF-CVE file. skipping CVE-2022-48063 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47946 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47943 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47942 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47941 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47940 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47939 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47938 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47929 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47696 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47695 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47673 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-47629 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-47629 skipping CVE-2022-47521 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47520 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47519 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47518 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47085 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47024 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-47021 skipping CVE-2022-47015 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46751 skipping CVE-2022-47011 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47010 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47008 as CVE page is older than CVRF-CVE file. skipping CVE-2022-47007 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46908 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46885 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46884 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46883 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46882 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46881 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46880 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46879 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46878 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46877 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46875 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46874 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46873 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46872 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46871 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46781 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46768 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46725 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46705 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46663 skipping CVE-2022-46700 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46699 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46698 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46692 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46691 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-46393 skipping CVE-2022-46349 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46344 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46343 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46342 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46341 as CVE page is older than CVRF-CVE file. skipping CVE-2022-46340 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46285 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46176 skipping CVE-2022-46283 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46174 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-46169 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-46165 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46149 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-46146 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-46146 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-46146 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-46146 CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2022-45919: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry? CVE-2022-45919: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-45919: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-45919: no packages for SUSE Real Time Module 15 SP5, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP5, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-45919: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2022-45919: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry? CVE-2022-45919: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2022-45919: no packages for SUSE Real Time Module 15 SP3, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP5, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2022-45919: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry? CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2022-45919: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-45919: no packages for SUSE Real Time Module 15 SP4, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2022-45919: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry? CVE-2022-45919: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-45919: no packages for Container rancher/elemental-teal-rt/5.4:1.2.3-2.2.63, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry? CVE-2022-45919: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP5, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for openSUSE Leap Micro 5.4, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry? CVE-2022-45919: no packages for Container rancher/elemental-teal-rt/5.4:1.2.3-2.2.63, but entry? CVE-2022-45919: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest, but entry? CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry? CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry? CVE-2022-45919: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry? CVE-2022-45919: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-45919: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-45919: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-45919: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-45919: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-45919: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-45919: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-45919: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-45919: no packages for SUSE Real Time Module 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Real Time Module 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Real Time Module 15 SP5, but entry? CVE-2022-45919: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2022-45919: no packages for openSUSE Leap Micro 5.4, but entry? CVE-2022-45919: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry? CVE-2022-45919: no packages for Container rancher/elemental-teal-rt/5.4:1.2.3-2.2.63, but entry? CVE-2022-45919: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest, but entry? CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry? CVE-2022-45919: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry? CVE-2022-45919: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry? CVE-2022-45919: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-45919: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-45919: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-45919: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-45919: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-45919: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Availability Extension 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Live Patching 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Micro 5.4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Legacy 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2022-45919: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-45919: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-45919: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-45919: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-45919: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-45919: no packages for SUSE Real Time Module 15 SP3, but entry? CVE-2022-45919: no packages for SUSE Real Time Module 15 SP4, but entry? CVE-2022-45919: no packages for SUSE Real Time Module 15 SP5, but entry? CVE-2022-45919: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2022-45919: no packages for openSUSE Leap Micro 5.4, but entry? skipping CVE-2022-45939 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45934 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45887 skipping CVE-2022-45888 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45884 skipping CVE-2022-45886 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45885 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45873 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45869 as CVE page is older than CVRF-CVE file. CVE-2022-45693: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-45693: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-45693: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-45693: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-45693: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-45693: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-45693: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-45693: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-45693: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-45693: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-45693: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-45693: no packages for Container bci/openjdk:latest, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-45693: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-45693: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-45693: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-45693: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-45693: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-45693: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-45693: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-45693: no packages for Container bci/openjdk:latest, but entry? CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-45693: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-45693: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-45693: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-45693: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-45693: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-45693: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-45693: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-45693: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-45693: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-45693: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-45693: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-45693: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-45693: no packages for Container bci/openjdk:latest, but entry? CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-45693: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-45693: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-45693: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-45693: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-45693: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-45693: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-45693: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-45693: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-45693: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-45693: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-45693: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-45693: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2022-45703 as CVE page is older than CVRF-CVE file. CVE-2022-45685: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-45685: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-45685: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-45685: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-45685: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-45685: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-45685: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-45685: no packages for Container bci/openjdk:latest, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-45685: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-45685: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-45685: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-45685: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-45685: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-45685: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-45685: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-45685: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-45685: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-45685: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-45685: no packages for Container bci/openjdk:latest, but entry? CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-45685: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-45685: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-45685: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-45685: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-45685: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-45685: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-45685: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-45685: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-45685: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-45685: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-45685: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-45685: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-45685: no packages for Container bci/openjdk:latest, but entry? CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-45685: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-45685: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-45685: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-45685: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-45685: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-45685: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-45685: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-45685: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-45685: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-45685: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-45685: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-45685: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2022-45587 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45586 as CVE page is older than CVRF-CVE file. notsure where SUSE Linux Enterprise Module for Package Hub 15 SP3 is contained? skipping CVE-2022-45421 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45420 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45419 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45418 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45417 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45416 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45415 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45413 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45412 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45411 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45410 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45409 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45408 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45407 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45406 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45405 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45404 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45403 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-45198 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-45197 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-45197 No V5 entry found for CVE-2022-45157 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/45xxxx/CVE-2022-45157.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45154 skipping CVE-2022-45153 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45063 skipping CVE-2022-45143 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45142 as CVE page is older than CVRF-CVE file. skipping CVE-2022-45141 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45061 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-45061.xml 2024-10-22 02:36:39.164600000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-45061.xml.new 2024-10-29 01:38:58.853847000 +0100 @@ -14,13 +14,13 @@ 1 - 134 - 2024-10-22T00:36:38Z + 135 + 2024-10-29T00:38:58Z current 2022-11-10T00:42:32Z - 2024-10-22T00:36:38Z + 2024-10-29T00:38:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3189,6 +3189,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36-3.6.15-37.1 @@ -9723,6 +9741,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.15-4.1 as a component of openSUSE Tumbleweed @@ -12029,6 +12065,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.15-4.1 openSUSE Tumbleweed:python38-32bit-3.8.15-4.1 openSUSE Tumbleweed:python38-curses-3.8.15-4.1 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-45060 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-45059 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-45047 skipping CVE-2022-44840 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44793 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44792 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-44640 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-44640 skipping CVE-2022-44638 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44617 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44572 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44571 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44570 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44566 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44268 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44267 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44034 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44033 as CVE page is older than CVRF-CVE file. skipping CVE-2022-44032 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43995 no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-43945 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43945 skipping CVE-2022-43760 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-43705 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-43705 skipping CVE-2022-43754 as CVE page is older than CVRF-CVE file. skipping CVE-2022-43753 as CVE page is older than CVRF-CVE file. skipping CVE-2022-43750 as CVE page is older than CVRF-CVE file. skipping CVE-2022-43680 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-43552 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43552 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43548 skipping CVE-2022-43551 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-43507 skipping CVE-2022-43516 as CVE page is older than CVRF-CVE file. skipping CVE-2022-43515 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-43272 skipping CVE-2022-43295 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42969 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42932 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-42920 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42920 skipping CVE-2022-42930 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42929 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42928 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42927 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42919 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-42919.xml 2024-10-22 02:37:27.307569000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-42919.xml.new 2024-10-29 01:39:13.633064000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-22T00:37:26Z + 43 + 2024-10-29T00:39:13Z current 2022-10-27T23:44:55Z - 2024-10-22T00:37:26Z + 2024-10-29T00:39:13Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -765,6 +765,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -1446,6 +1464,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python39-3.9.15-2.1 as a component of openSUSE Tumbleweed @@ -2551,6 +2587,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python39-3.9.15-2.1 openSUSE Tumbleweed:python39-32bit-3.9.15-2.1 openSUSE Tumbleweed:python39-curses-3.9.15-2.1 No V5 entry found for CVE-2022-42917 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/42xxxx/CVE-2022-42917.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42917 skipping CVE-2022-42916 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42915 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42898 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42896 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42895 as CVE page is older than CVRF-CVE file. CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-42889: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-42889: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-42889: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-42889: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-42889: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-42889: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-42889: no packages for Container bci/openjdk:latest, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-42889: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-42889: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-42889: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-42889: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-42889: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-42889: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-42889: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-42889: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-42889: no packages for Container bci/openjdk:latest, but entry? CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-42889: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-42889: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-42889: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-42889: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-42889: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-42889: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-42889: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-42889: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-42889: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-42889: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-42889: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-42889: no packages for Container bci/openjdk:latest, but entry? CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-42889: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-42889: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-42889: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-42889: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-42889: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-42889: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-42889: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-42889: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-42889: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-42889: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2022-42867 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42863 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42856 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42852 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42826 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42824 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42823 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42799 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42703 skipping CVE-2022-42722 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42721 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42720 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42719 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42432 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42336 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42335 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42326 skipping CVE-2022-42330 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42329 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42328 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42327 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42325 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42323 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42322 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42321 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42320 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42319 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42318 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42317 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42316 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42315 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42314 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42313 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42312 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42311 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42310 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42309 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42265 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-42003 skipping CVE-2022-42252 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42012 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42011 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42010 as CVE page is older than CVRF-CVE file. skipping CVE-2022-42004 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41974 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41973 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41966 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41946 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41916 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41916 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41915 skipping CVE-2022-41903 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41881 skipping CVE-2022-41862 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41861 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41860 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41859 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41858 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-41853 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41848 skipping CVE-2022-41850 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41849 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41844 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41843 as CVE page is older than CVRF-CVE file. skipping CVE-2022-41842 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41804 skipping CVE-2022-41808 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41751 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41751 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-41751 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41742 skipping CVE-2022-41741 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41725 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41724 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41723 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-41723 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-41723 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-41723 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41722 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41720 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41717 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41716 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41715 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-41715 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-41715 skipping CVE-2022-41674 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41556 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41556 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41550 skipping CVE-2022-41409 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41325 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41325 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-41325 CVE-2022-41323: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2022-41323: no packages for openSUSE Leap 15.5, but entry? no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-41323 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-41323 CVE-2022-41323: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2022-41323: no packages for openSUSE Leap 15.5, but entry? CVE-2022-41323: no packages for SUSE Package Hub 15 SP5, but entry? CVE-2022-41323: no packages for openSUSE Leap 15.5, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41318 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-41317 CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Enterprise Storage 6, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2022-41218: no packages for SUSE Manager Server 4.1, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2022-41218: no packages for SUSE Liberty Linux 8, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry? CVE-2022-41218: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-41218: no packages for SUSE Manager Proxy 4.1, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-BCL, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Basic, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry? CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2022-41218: no packages for SUSE Real Time Module 15 SP3, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2022-41218: no packages for SUSE Real Time Module 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2022-41218: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-GCE, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-BCL, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2022-41218: no packages for SUSE Manager Retail Branch Server 4.1, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-41218: no packages for Image SLES15-SP4, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Standard, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP3-TERADATA, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry? CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry? CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry? CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry? CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Basic, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Standard, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-41218: no packages for SUSE Enterprise Storage 6, but entry? CVE-2022-41218: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-41218: no packages for SUSE Liberty Linux 8, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP3-TERADATA, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-BCL, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-BCL, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Manager Proxy 4.1, but entry? CVE-2022-41218: no packages for SUSE Manager Retail Branch Server 4.1, but entry? CVE-2022-41218: no packages for SUSE Manager Server 4.1, but entry? CVE-2022-41218: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-41218: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-41218: no packages for SUSE Real Time Module 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Real Time Module 15 SP4, but entry? CVE-2022-41218: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry? CVE-2022-41218: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry? CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry? CVE-2022-41218: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry? CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Basic, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Azure-Standard, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2022-41218: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2022-41218: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-41218: no packages for SUSE Enterprise Storage 6, but entry? CVE-2022-41218: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-41218: no packages for SUSE Liberty Linux 8, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP1, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Availability Extension 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP1, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Live Patching 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Legacy 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP6, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Real Time 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP3-TERADATA, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP2-BCL, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-BCL, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-BCL, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-41218: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2022-41218: no packages for SUSE Manager Proxy 4.1, but entry? CVE-2022-41218: no packages for SUSE Manager Retail Branch Server 4.1, but entry? CVE-2022-41218: no packages for SUSE Manager Server 4.1, but entry? CVE-2022-41218: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-41218: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-41218: no packages for SUSE Real Time Module 15 SP3, but entry? CVE-2022-41218: no packages for SUSE Real Time Module 15 SP4, but entry? CVE-2022-41218: no packages for openSUSE Leap Micro 5.2, but entry? skipping CVE-2022-41222 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2022-41160 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/41xxxx/CVE-2022-41160.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-40982 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-40898 skipping CVE-2022-40962 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40961 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40960 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40959 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40958 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40957 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40956 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40899 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40897 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40768 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40755 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40735 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40674 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-40617 skipping CVE-2022-40626 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-40468 skipping CVE-2022-40609 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40540 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40476 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40433 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40307 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40304 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40303 as CVE page is older than CVRF-CVE file. CVE-2022-40150: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-40150: no packages for Container bci/openjdk:latest, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-40150: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-40150: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-40150: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-40150: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-40150: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-40150: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-40150: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-40150: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-40150: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-40150: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-40150: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-40150: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-40150: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-40150: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-40150: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-40150: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-40150: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-40150: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-40150: no packages for Container bci/openjdk:latest, but entry? CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-40150: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-40150: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-40150: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-40150: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-40150: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-40150: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-40150: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-40150: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-40150: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-40150: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-40150: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-40150: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-40150: no packages for Container bci/openjdk:latest, but entry? CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-40150: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-40150: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-40150: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-40150: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-40150: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-40150: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-40150: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-40150: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-40150: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-40150: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-40150: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-40150: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2022-40152 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40151 as CVE page is older than CVRF-CVE file. CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-40149: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-40149: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-40149: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-40149: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-40149: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-40149: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-40149: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-40149: no packages for Container bci/openjdk:latest, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-40149: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-40149: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-40149: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-40149: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-40149: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-40149: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-40149: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-40149: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-40149: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-40149: no packages for Container bci/openjdk:latest, but entry? CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-40149: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-40149: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-40149: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-40149: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-40149: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-40149: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-40149: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-40149: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-40149: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-40149: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-40149: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-40149: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-40149: no packages for Container bci/openjdk:latest, but entry? CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-40149: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-40149: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-40149: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-40149: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-40149: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-40149: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-40149: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-40149: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-40149: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-40149: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-40149: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-40149: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-40146: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-40146: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-40146: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-40146: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-40146: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-40146: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-40146: no packages for Container bci/openjdk:latest, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-40146: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-40146: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-40146: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-40146: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-40146: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-40146: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-40146: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-40146: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-40146: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-40146: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-40146: no packages for Container bci/openjdk:latest, but entry? CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-40146: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-40146: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-40146: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-40146: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-40146: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-40146: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-40146: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-40146: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-40146: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-40146: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-40146: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-40146: no packages for Container bci/openjdk:latest, but entry? CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-40146: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-40146: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-40146: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-40146: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-40146: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-40146: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-40146: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-40146: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-40146: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-40146: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-40023 skipping CVE-2022-40133 as CVE page is older than CVRF-CVE file. skipping CVE-2022-40090 as CVE page is older than CVRF-CVE file. skipping CVE-2022-39842 as CVE page is older than CVRF-CVE file. skipping CVE-2022-39399 as CVE page is older than CVRF-CVE file. skipping CVE-2022-39377 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-39348 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39346 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39334 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-39334 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39333 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-39333 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39332 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-39332 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-39331 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-39331 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-39324 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39324 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39324 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39307 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39307 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39306 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39306 skipping CVE-2022-39260 as CVE page is older than CVRF-CVE file. skipping CVE-2022-39253 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39229 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39229 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-39201 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-39201 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-39188 skipping CVE-2022-39190 as CVE page is older than CVRF-CVE file. skipping CVE-2022-39189 as CVE page is older than CVRF-CVE file. skipping CVE-2022-39177 as CVE page is older than CVRF-CVE file. skipping CVE-2022-39176 as CVE page is older than CVRF-CVE file. skipping CVE-2022-39046 as CVE page is older than CVRF-CVE file. skipping CVE-2022-39028 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38928 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38791 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38784 as CVE page is older than CVRF-CVE file. CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-38752: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38752: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-38752: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-38752: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-38752: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-38752: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-38752: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-38752: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-38752: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-38752: no packages for Container bci/openjdk:latest, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-38752 CVE-2022-38752: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-38752: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-38752: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-38752: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-38752: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-38752: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-38752: no packages for Container bci/openjdk:latest, but entry? CVE-2022-38752: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-38752: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-38752: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-38752: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-38752: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-38752: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-38752: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-38752: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-38752: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-38752: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-38752: no packages for Container bci/openjdk:latest, but entry? CVE-2022-38752: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-38752: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-38752: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-38752: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-38752: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-38752: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-38752: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-38752: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-38752: no packages for SUSE Manager Server 4.2, but entry? no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-38725 skipping CVE-2022-38751 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38750 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38749 as CVE page is older than CVRF-CVE file. CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-38648: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-38648: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-38648: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-38648: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-38648: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-38648: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-38648: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-38648: no packages for Container bci/openjdk:latest, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-38648: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-38648: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-38648: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-38648: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-38648: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-38648: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-38648: no packages for Container bci/openjdk:latest, but entry? CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-38648: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-38648: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-38648: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-38648: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-38648: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-38648: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-38648: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-38648: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-38648: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-38648: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-38648: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-38648: no packages for Container bci/openjdk:latest, but entry? CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-38648: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-38648: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-38648: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-38648: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-38648: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-38648: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-38648: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-38648: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-38648: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-38648: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2022-38533 as CVE page is older than CVRF-CVE file. CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-38398: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-38398: no packages for Container bci/openjdk:latest, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-38398: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-38398: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-38398: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-38398: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-38398: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-38398: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-38398: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-38398: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-38398: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-38398: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-38398: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-38398: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-38398: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-38398: no packages for Container bci/openjdk:latest, but entry? CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-38398: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-38398: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-38398: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-38398: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-38398: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-38398: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-38398: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-38398: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-38398: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-38398: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-38398: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-38398: no packages for Container bci/openjdk:latest, but entry? CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-38398: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-38398: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-38398: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-38398: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-38398: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-38398: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-38398: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-38398: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-38398: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-38398: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2022-38478 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38477 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38476 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38475 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38474 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38473 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38472 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38457 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38349 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38334 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-38223 skipping CVE-2022-38238 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38237 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38236 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38235 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38234 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38233 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38231 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38230 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38229 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38228 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38227 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-38150 skipping CVE-2022-38222 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38178 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38177 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38171 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-38090 skipping CVE-2022-38128 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38127 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38126 as CVE page is older than CVRF-CVE file. skipping CVE-2022-38096 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-38023 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-37967 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-37966 CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-37866: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-37866: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-37866: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-37866: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-37866: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-37866: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-37866: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-37866: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-37866: no packages for Container bci/openjdk:latest, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-37866: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-37866: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-37866: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-37866: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-37866: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-37866: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-37866: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-37866: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-37866: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-37866: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-37866: no packages for Container bci/openjdk:latest, but entry? CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-37866: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-37866: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-37866: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-37866: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-37866: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-37866: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-37866: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-37866: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-37866: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-37866: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-37866: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-37866: no packages for Container bci/openjdk:latest, but entry? CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-37866: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-37866: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-37866: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-37866: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-37866: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-37866: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-37866: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-37866: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-37866: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-37866: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-37866: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-37865: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-37865: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-37865: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-37865: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-37865: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-37865: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-37865: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-37865: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-37865: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-37865: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-37865: no packages for Container bci/openjdk:latest, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-37865: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-37865: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-37865: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-37865: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-37865: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-37865: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-37865: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-37865: no packages for Container bci/openjdk:latest, but entry? CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-37865: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-37865: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-37865: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-37865: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-37865: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-37865: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-37865: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-37865: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-37865: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-37865: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-37865: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-37865: no packages for Container bci/openjdk:latest, but entry? CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-37865: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-37865: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-37865: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-37865: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-37865: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-37865: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-37865: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-37865: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-37865: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-37865: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-37797 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37797 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37706 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37705 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37704 No V5 entry found for CVE-2022-37474 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/37xxxx/CVE-2022-37474.json:No such file or directory skipping CVE-2022-37454 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-37428 skipping CVE-2022-37436 as CVE page is older than CVRF-CVE file. skipping CVE-2022-37434 as CVE page is older than CVRF-CVE file. skipping CVE-2022-37416 as CVE page is older than CVRF-CVE file. skipping CVE-2022-37290 as CVE page is older than CVRF-CVE file. skipping CVE-2022-37052 as CVE page is older than CVRF-CVE file. skipping CVE-2022-37051 as CVE page is older than CVRF-CVE file. skipping CVE-2022-37050 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-37035 skipping CVE-2022-37032 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-37026 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36946 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36879 skipping CVE-2022-36765 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36764 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36763 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36760 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36648 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-36359 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-36359 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36280 skipping CVE-2022-36320 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36319 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36318 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36317 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36316 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36315 as CVE page is older than CVRF-CVE file. skipping CVE-2022-36314 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36227 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36114 skipping CVE-2022-36123 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36113 CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-36062: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-36062: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-36062: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-36062: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-36062: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-36062: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-36062: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-36062: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-36062: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-36062: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-36062: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-36062: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-36062: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-36062: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-36062: no packages for SUSE Manager Tools for SLE Micro 5, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36056 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36033 skipping CVE-2022-36055 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-36021 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-35978 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-35978 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35977 CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-35957: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-35957: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-35957: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-35957: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-35957: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-35957: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-35957: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-35957: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-35957: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-35957: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-35957: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-35957: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-35957: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-35957: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-35957: no packages for SUSE Manager Tools for SLE Micro 5, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35949 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35948 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-35931 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35929 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-35861 skipping CVE-2022-35737 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35414 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-35409 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35256 skipping CVE-2022-35260 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-35255 skipping CVE-2022-35252 as CVE page is older than CVRF-CVE file. skipping CVE-2022-35230 as CVE page is older than CVRF-CVE file. skipping CVE-2022-35229 as CVE page is older than CVRF-CVE file. skipping CVE-2022-35206 as CVE page is older than CVRF-CVE file. skipping CVE-2022-35205 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-35133 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-34903 skipping CVE-2022-34918 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-34835 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-34526 skipping CVE-2022-34568 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34503 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34495 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34494 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34485 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34484 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34483 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34482 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34481 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34480 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34479 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34478 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34477 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34476 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34475 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34474 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34473 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34472 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34471 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34470 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34469 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34468 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34305 as CVE page is older than CVRF-CVE file. skipping CVE-2022-34266 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-34037 skipping CVE-2022-34169 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33981 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33972 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33967 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-33903 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-33903 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33748 skipping CVE-2022-33879 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33746 skipping CVE-2022-33747 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33745 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33742 skipping CVE-2022-33743 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33741 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33740 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33196 skipping CVE-2022-33108 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-33103 skipping CVE-2022-33099 as CVE page is older than CVRF-CVE file. skipping CVE-2022-33068 as CVE page is older than CVRF-CVE file. skipping CVE-2022-33065 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-33025 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32933 skipping CVE-2022-32981 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32919 skipping CVE-2022-32923 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32912 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32893 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32891 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32888 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32886 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32885 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32816 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32792 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32746 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32745 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32744 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32743 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32742 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32547 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32546 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32545 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-32323 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-32323 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32296 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-32293 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-32293 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-32292 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-32292 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32250 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-32224 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32215 skipping CVE-2022-32221 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32214 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32213 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32212 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32208 skipping CVE-2022-32209 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32206 skipping CVE-2022-32207 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32205 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32190 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32189 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-32149 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-32149 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-32149 skipping CVE-2022-32166 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-32148 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31813 skipping CVE-2022-32091 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32089 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32088 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32087 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32086 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32085 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32084 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32083 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32082 as CVE page is older than CVRF-CVE file. skipping CVE-2022-32081 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31799 skipping CVE-2022-31783 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31747 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31744 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31742 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31741 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31740 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31739 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31738 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31737 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31736 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31676 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31651 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-31651 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31650 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-31650 No V5 entry found for CVE-2022-31631 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/31xxxx/CVE-2022-31631.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31631 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31630 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31629 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-31629 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31628 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31626 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31625 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31394 skipping CVE-2022-31624 as CVE page is older than CVRF-CVE file. skipping CVE-2022-31623 as CVE page is older than CVRF-CVE file. skipping CVE-2022-31622 as CVE page is older than CVRF-CVE file. skipping CVE-2022-31621 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31256 no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-31254 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31254 skipping CVE-2022-31255 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31252 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31250 skipping CVE-2022-31251 as CVE page is older than CVRF-CVE file. skipping CVE-2022-31248 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-31214 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31214 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31213 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-31212 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31197 skipping CVE-2022-31163 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31150 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-31130 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-31130 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-31123 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-31123 skipping CVE-2022-31129 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31117 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31116 CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-31107: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-31107: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2022-31107: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-31107: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-31107: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-31107: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2022-31107: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2022-31107: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-31107: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-31107: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-31107: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-31107: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-31107: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-31107: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-31107: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-31107: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-31107: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-31107: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-31107: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-31107: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-31107: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-31107: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-31107: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-31107: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-31107: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-31107: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-31107: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-31097: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-31097: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-31097: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2022-31097: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-31097: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2022-31097: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31097: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-31097: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-31097: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-31097: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-31097: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-31097: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-31097: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-31097: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-31097: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-31097: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31097: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-31097: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-31097: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-31097: no packages for SUSE Enterprise Storage 7, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-BCL, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-LTSS-TERADATA, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-ESPOS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP4-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP4, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-31097: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.2, but entry? CVE-2022-31097: no packages for SUSE Manager Proxy Module 4.3, but entry? CVE-2022-31097: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-31097: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-31097: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2022-31097: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2022-31097: no packages for SUSE OpenStack Cloud 9, but entry? CVE-2022-31097: no packages for SUSE OpenStack Cloud Crowbar 9, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31081 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31030 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-31008 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30790 skipping CVE-2022-30973 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30767 skipping CVE-2022-30775 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30699 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30698 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30635 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30634 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30633 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30632 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30631 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30630 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30629 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30594 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30580 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30552 skipping CVE-2022-30556 as CVE page is older than CVRF-CVE file. skipping CVE-2022-30550 as CVE page is older than CVRF-CVE file. skipping CVE-2022-30524 as CVE page is older than CVRF-CVE file. skipping CVE-2022-30522 as CVE page is older than CVRF-CVE file. skipping CVE-2022-30294 as CVE page is older than CVRF-CVE file. skipping CVE-2022-30293 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30187 skipping CVE-2022-30126 as CVE page is older than CVRF-CVE file. skipping CVE-2022-30123 as CVE page is older than CVRF-CVE file. skipping CVE-2022-30122 as CVE page is older than CVRF-CVE file. skipping CVE-2022-30115 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-30065 skipping CVE-2022-29968 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29917 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29916 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29914 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29912 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29911 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29909 no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-29901 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29901 no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-29900 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29900 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29869 skipping CVE-2022-29885 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29824 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29804 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-29718 CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-29599: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-29599: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-29599: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-29599: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-29599: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-29599: no packages for Container bci/openjdk:latest, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-29599: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-29599: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-29599: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-29599: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-29599: no packages for Container bci/openjdk:latest, but entry? CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-29599: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-29599: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-29599: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-29599: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-29599: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-29599: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-29599: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-29599: no packages for Container bci/openjdk:latest, but entry? CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-29599: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-29599: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-29599: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-29599: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-29599: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-29599: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-29599: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-29599: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-29599: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-29599: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29581 skipping CVE-2022-29582 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29526 skipping CVE-2022-29501 as CVE page is older than CVRF-CVE file. skipping CVE-2022-29500 as CVE page is older than CVRF-CVE file. skipping CVE-2022-29458 as CVE page is older than CVRF-CVE file. skipping CVE-2022-29404 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29244 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29217 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29181 skipping CVE-2022-29187 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-29170 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-29170 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29162 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29155 skipping CVE-2022-29156 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-29154 no cpe found for SUSE Package Hub 15 SP6 in CVE-2022-28948 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-28946 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-28946 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28748 skipping CVE-2022-28893 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28805 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28796 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-28748.xml 2024-10-01 01:50:21.513806000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-28748.xml.new 2024-10-29 01:42:30.950770000 +0100 @@ -14,13 +14,13 @@ 1 - 143 - 2024-09-30T23:50:20Z + 144 + 2024-10-29T00:42:30Z current 2022-04-11T11:44:37Z - 2024-09-30T23:50:20Z + 2024-10-29T00:42:30Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3224,41 +3224,41 @@ ocfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.121.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -6634,18 +6634,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.121.2 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.121.2 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.121.2 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.121.2 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.121.2 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28737 skipping CVE-2022-28739 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28738 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28736 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28734 skipping CVE-2022-28735 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28733 skipping CVE-2022-28693 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28615 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28614 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28506 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28463 CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-28366: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-28366: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-28366: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-28366: no packages for Container bci/openjdk:latest, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-28366: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-28366: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-28366: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-28366: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-28366: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-28366: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-28366: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-28366: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-28366: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-28366: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-28366: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-28366: no packages for Container bci/openjdk:latest, but entry? CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-28366: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-28366: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-28366: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-28366: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-28366: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-28366: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-28366: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-28366: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-28366: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-28366: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-28366: no packages for Container bci/openjdk:latest, but entry? CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-28366: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-28366: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-28366: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-28366: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-28366: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-28366: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-28366: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-28366: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-28366: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-28366: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28356 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-28347 skipping CVE-2022-28350 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28349 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28348 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-28346 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28327 skipping CVE-2022-28330 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-28131 skipping CVE-2022-28321 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28289 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28288 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28287 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28286 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28285 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28284 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28283 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28282 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28281 as CVE page is older than CVRF-CVE file. skipping CVE-2022-28199 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-28085 skipping CVE-2022-28066 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27950 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27943 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27780 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27779 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27778 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27777 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27776 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27775 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27774 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27672 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27664 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-27664 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-27664 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-27664 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27651 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27649 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27536 skipping CVE-2022-27458 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27457 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27456 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27455 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27452 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27451 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27449 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27448 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27447 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27446 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27445 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27444 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27239 skipping CVE-2022-27406 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27405 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27404 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27387 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27386 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27385 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27384 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27383 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27382 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27381 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27380 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27379 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27378 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27377 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27376 as CVE page is older than CVRF-CVE file. skipping CVE-2022-27337 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-27227 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-27191 no cpe found for SUSE Manager Client Tools for RHEL, Liberty and Clones 9-CLIENT-TOOLS in CVE-2022-27191 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-27191 no cpe found for SUSE Package Hub 15 SP6 in CVE-2022-27191 skipping CVE-2022-27223 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-27114 skipping CVE-2022-26981 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26878 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26719 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26717 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26716 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26710 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26709 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26700 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26691 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26520 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-26505 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26490 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26365 skipping CVE-2022-26488 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26486 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26485 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26387 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26386 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26385 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26384 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26383 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26382 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26381 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26377 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26373 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26364 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26363 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26362 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-26354 skipping CVE-2022-26353 as CVE page is older than CVRF-CVE file. skipping CVE-2022-26280 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-25881 skipping CVE-2022-25857 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25762 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25647 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25636 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25634 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25375 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25368 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-25236 skipping CVE-2022-25315 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25314 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25313 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25310 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25309 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25308 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25265 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25258 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25255 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-25236.xml 2024-10-19 02:03:16.314454000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-25236.xml.new 2024-10-29 01:43:14.257982000 +0100 @@ -14,13 +14,13 @@ 1 - 256 - 2024-10-19T00:03:15Z + 257 + 2024-10-29T00:43:13Z current 2022-02-17T02:52:33Z - 2024-10-19T00:03:15Z + 2024-10-29T00:43:13Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3225,9 +3225,6 @@ libexpat-devel-32bit-2.4.6-1.1 - - libexpat1 - libexpat1-2.0.1-88.42.22.1 @@ -3258,9 +3255,6 @@ libexpat1-2.5.0-2.188 - - libexpat1-32bit - libexpat1-32bit-2.0.1-88.42.22.1 @@ -3489,6 +3483,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36-3.6.15-6.67.4 @@ -6864,6 +6876,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.14-1.1 as a component of openSUSE Tumbleweed @@ -6924,12 +6954,6 @@ expat as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - libexpat1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - libexpat1-32bit as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - @@ -8043,6 +8067,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.14-1.1 openSUSE Tumbleweed:python38-32bit-3.8.14-1.1 openSUSE Tumbleweed:python38-curses-3.8.14-1.1 skipping CVE-2022-25235 as CVE page is older than CVRF-CVE file. skipping CVE-2022-25147 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24976 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24976 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24952 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24952 skipping CVE-2022-24958 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24951 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24951 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24950 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24950 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24949 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24949 skipping CVE-2022-24919 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24918 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24917 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24903 as CVE page is older than CVRF-CVE file. CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-24839: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-24839: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-24839: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-24839: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-24839: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-24839: no packages for Container bci/openjdk:latest, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-24839: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-24839: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-24839: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-24839: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-24839: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-24839: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-24839: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-24839: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-24839: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-24839: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-24839: no packages for Container bci/openjdk:latest, but entry? CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-24839: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-24839: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-24839: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-24839: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-24839: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-24839: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-24839: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-24839: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-24839: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-24839: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-24839: no packages for Container bci/openjdk:latest, but entry? CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-24839: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-24839: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-24839: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-24839: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-24839: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-24839: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-24839: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-24839: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-24839: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-24839: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24836 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24834 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24828 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24828 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24823 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-24801 skipping CVE-2022-24810 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24809 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24808 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24807 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24806 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24805 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24795 skipping CVE-2022-24790 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24769 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24765 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24761 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24736 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24735 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24715 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24714 skipping CVE-2022-24713 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24675 skipping CVE-2022-24599 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24407 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24349 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24302 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24191 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-24130 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-24128 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-24128 skipping CVE-2022-24122 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24107 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24106 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24052 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24051 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24050 as CVE page is older than CVRF-CVE file. skipping CVE-2022-24048 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23990 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23959 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-23959 skipping CVE-2022-23943 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23833 skipping CVE-2022-23853 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23852 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23825 skipping CVE-2022-23830 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23824 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-23808 skipping CVE-2022-23820 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23816 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2022-23807 no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-23807 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23807 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-23807 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23806 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23648 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23648 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-23648 skipping CVE-2022-23634 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23633 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23607 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23552 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-23552 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-23552 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23527 skipping CVE-2022-23526 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23525 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23524 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23521 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23520 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23519 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23518 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23517 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23516 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23515 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23514 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23493 skipping CVE-2022-23491 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23484 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23483 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23482 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23481 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23480 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23479 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23478 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23477 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23471 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23468 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-23308 skipping CVE-2022-23437 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-23307 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23307 no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-23305 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23305 no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-23302 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23302 skipping CVE-2022-23222 as CVE page is older than CVRF-CVE file. CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-23181: no packages for HPE Helion OpenStack 8, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-23181: no packages for SUSE OpenStack Cloud Crowbar 8, but entry? CVE-2022-23181: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-23181: no packages for SUSE OpenStack Cloud 8, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-23181: no packages for HPE Helion OpenStack 8, but entry? CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-23181: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2022-23181: no packages for SUSE OpenStack Cloud 8, but entry? CVE-2022-23181: no packages for SUSE OpenStack Cloud Crowbar 8, but entry? CVE-2022-23181: no packages for HPE Helion OpenStack 8, but entry? CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-23181: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-23181: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-23181: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2022-23181: no packages for SUSE OpenStack Cloud 8, but entry? CVE-2022-23181: no packages for SUSE OpenStack Cloud Crowbar 8, but entry? skipping CVE-2022-23219 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23218 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23134 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23133 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23132 as CVE page is older than CVRF-CVE file. skipping CVE-2022-23131 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23098 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23097 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-23096 skipping CVE-2022-22967 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22941 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22936 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22935 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22934 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-22818 skipping CVE-2022-22844 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22827 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22826 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22825 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22824 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22823 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22822 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-22816 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-22815 skipping CVE-2022-22721 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-22707 skipping CVE-2022-22719 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22677 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22662 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22637 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22629 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22628 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22624 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22620 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22075 as CVE page is older than CVRF-CVE file. skipping CVE-2022-22058 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21950 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-21950 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21944 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21797 CVE-2022-21724: no packages for SUSE Manager Retail Branch Server 4.1, but entry? CVE-2022-21724: no packages for SUSE Manager Server 4.1, but entry? CVE-2022-21724: no packages for SUSE Manager Proxy 4.1, but entry? CVE-2022-21724: no packages for SUSE Manager Proxy 4.1, but entry? CVE-2022-21724: no packages for SUSE Manager Retail Branch Server 4.1, but entry? CVE-2022-21724: no packages for SUSE Manager Server 4.1, but entry? CVE-2022-21724: no packages for SUSE Manager Proxy 4.1, but entry? CVE-2022-21724: no packages for SUSE Manager Retail Branch Server 4.1, but entry? CVE-2022-21724: no packages for SUSE Manager Server 4.1, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21716 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21699 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21698 no cpe found for SUSE Package Hub 15 SP2 in CVE-2022-21653 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-21653 skipping CVE-2022-21628 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21626 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21624 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21619 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21618 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21597 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21595 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21549 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21541 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21540 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21499 skipping CVE-2022-21505 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21504 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21496 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21476 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21449 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21443 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21434 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21426 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21385 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21366 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21365 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21360 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21349 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21341 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21340 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21305 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21299 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21296 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21294 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21293 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21291 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21283 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21282 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21277 as CVE page is older than CVRF-CVE file. skipping CVE-2022-21248 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21233 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21216 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21180 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21166 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21151 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21127 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21125 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-21123 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20796 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20792 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20785 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20771 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20770 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20369 skipping CVE-2022-20572 as CVE page is older than CVRF-CVE file. skipping CVE-2022-20567 as CVE page is older than CVRF-CVE file. skipping CVE-2022-20421 as CVE page is older than CVRF-CVE file. skipping CVE-2022-20382 as CVE page is older than CVRF-CVE file. skipping CVE-2022-20371 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20368 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-20368.xml 2024-10-01 01:53:45.989069000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-20368.xml.new 2024-10-29 01:45:56.656966000 +0100 @@ -14,13 +14,13 @@ 1 - 109 - 2024-09-30T23:53:45Z + 110 + 2024-10-29T00:45:56Z current 2022-08-12T23:36:50Z - 2024-09-30T23:53:45Z + 2024-10-29T00:45:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3397,41 +3397,41 @@ ocfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.133.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -6907,18 +6907,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.133.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.133.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.133.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.133.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.133.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20154 skipping CVE-2022-20158 as CVE page is older than CVRF-CVE file. skipping CVE-2022-20153 as CVE page is older than CVRF-CVE file. skipping CVE-2022-20148 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-20132 skipping CVE-2022-20119 as CVE page is older than CVRF-CVE file. skipping CVE-2022-20118 as CVE page is older than CVRF-CVE file. skipping CVE-2022-20117 as CVE page is older than CVRF-CVE file. skipping CVE-2022-20009 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-20001 no entry found for CVE-2022-6083 / /home/securitybot/prod/cve-database/cvelist/2022/6xxxx/CVE-2022-6083.json:No such file or directory No V5 entry found for CVE-2022-6083 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/6xxxx/CVE-2022-6083.json:No such file or directory no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-6083 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-6083 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4904 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4900 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4899 skipping CVE-2022-4883 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4842 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4744 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4743 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4696 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4662 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4645 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4515 skipping CVE-2022-4543 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4440 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4440 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4440 skipping CVE-2022-4450 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4439 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4439 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4439 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4438 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4438 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4438 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4437 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4437 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4437 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4436 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4436 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4436 skipping CVE-2022-4415 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-4378 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4378 skipping CVE-2022-4382 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4379 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4345 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4344 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4338 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4337 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4304 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4262 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4262 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-4262 skipping CVE-2022-4293 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4292 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4285 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4283 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4269 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4254 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4203 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4195 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4195 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4194 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4194 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4193 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4193 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4192 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4192 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4191 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4191 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4190 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4190 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4189 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4189 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4188 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4188 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4187 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4187 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4186 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4186 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4185 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4185 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4184 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4184 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4183 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4183 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4182 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4182 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4181 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4181 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4180 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4180 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4179 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4179 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4178 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4178 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4177 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4177 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4176 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4176 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4175 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4175 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4174 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4174 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4170 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-4170 skipping CVE-2022-4172 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-4135 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-4135 skipping CVE-2022-4144 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4141 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4139 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4132 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4129 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4128 as CVE page is older than CVRF-CVE file. skipping CVE-2022-4127 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-4095 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4095 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-4065 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3970 skipping CVE-2022-3996 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3977 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3964 skipping CVE-2022-3953 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3890 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3890 skipping CVE-2022-3924 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3910 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3903 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3889 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3889 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3889 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3888 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3888 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3888 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3887 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3887 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3887 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3886 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3886 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3886 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3885 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3885 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3885 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3723 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3723 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3723 skipping CVE-2022-3872 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3857 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3854 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3821 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3787 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3786 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3775 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3757 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3756 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3755 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3736 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3725 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3724 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3719 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3718 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3717 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3715 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3707 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3705 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3676 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3661 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3661 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3660 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3660 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3659 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3659 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3658 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3658 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3657 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3657 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3656 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3656 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3655 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3655 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3654 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3654 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3653 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3653 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3652 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3652 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3647 skipping CVE-2022-3650 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3649 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3646 skipping CVE-2022-3643 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3642 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3640 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP3-BCL in CVE-2022-3635 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3635 skipping CVE-2022-3637 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3636 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3629 skipping CVE-2022-3633 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3630 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3628 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3627 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3626 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3625 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3624 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3623 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3621 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3619 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3606 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3602 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3599 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3598 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3597 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3595 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3594 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3586 skipping CVE-2022-3592 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3591 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3566 skipping CVE-2022-3577 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3570 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3567 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3565 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3564 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-3560 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3560 skipping CVE-2022-3563 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3559 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3559 no cpe found for SUSE Package Hub 15 SP5 in CVE-2022-3559 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3550 skipping CVE-2022-3555 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3554 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3553 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3551 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3545 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3535 skipping CVE-2022-3544 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3543 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3542 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3541 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3534 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3533 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3532 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3531 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3526 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3524 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3523 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3522 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3521 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3520 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3515 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3500 skipping CVE-2022-3491 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3488 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3479 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3450 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3450 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3450 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3449 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3449 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3449 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3448 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3448 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3448 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3447 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3447 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3447 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3446 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3446 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3446 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3445 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3445 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3445 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3437 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3437 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3437 skipping CVE-2022-3435 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3424 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3373 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3373 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3370 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3370 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3341 skipping CVE-2022-3358 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3352 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3344 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3318 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3318 skipping CVE-2022-3324 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3317 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3317 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3316 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3316 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3315 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3315 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3314 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3314 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3313 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3313 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3312 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3312 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3311 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3311 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3310 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3310 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3309 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3309 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3308 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3308 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3307 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3307 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3306 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3306 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3305 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3305 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3304 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3304 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3303 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3294 skipping CVE-2022-3297 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3296 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3278 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3239 skipping CVE-2022-3256 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3204 skipping CVE-2022-3238 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3235 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3234 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3219 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3213 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3201 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3201 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3201 skipping CVE-2022-3202 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3200 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3200 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3200 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3199 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3199 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3199 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3198 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3198 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3198 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3197 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3197 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3197 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3196 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3196 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3196 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3195 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3195 skipping CVE-2022-3190 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3176 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-3171 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3162 skipping CVE-2022-3170 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3169 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3165 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3155 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3153 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3134 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3109 skipping CVE-2022-3115 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3114 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3113 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3112 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3111 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3110 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2022-3102 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/3xxxx/CVE-2022-3102.json:No such file or directory skipping CVE-2022-3108 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3107 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3106 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3105 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3104 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3103 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3075 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3075 no cpe found for openSUSE Leap 15.5 NonFree in CVE-2022-3075 skipping CVE-2022-3099 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3094 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3080 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3078 as CVE page is older than CVRF-CVE file. skipping CVE-2022-3077 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3071 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3071 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3058 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3058 skipping CVE-2022-3061 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3057 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3057 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3056 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3056 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3055 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3055 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3054 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3054 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3053 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3053 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3052 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3052 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3051 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3051 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3050 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3050 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3049 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3049 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3048 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3048 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3047 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3047 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3046 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3046 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3045 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3045 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3044 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3044 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3043 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3043 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3042 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3042 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3041 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3041 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3040 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3040 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3039 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3039 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-3038 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-3038 skipping CVE-2022-3037 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-3028 skipping CVE-2022-3016 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2990 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2989 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2977 skipping CVE-2022-2982 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2980 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2978 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2964 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-2964.xml 2024-10-22 03:04:00.023606000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2022-2964.xml.new 2024-10-29 01:47:33.806886000 +0100 @@ -14,13 +14,13 @@ 1 - 97 - 2024-10-22T01:03:59Z + 98 + 2024-10-29T00:47:33Z current 2022-08-24T23:41:28Z - 2024-10-22T01:03:59Z + 2024-10-29T00:47:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3133,41 +3133,41 @@ ocfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.139.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -6660,18 +6660,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.139.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.139.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.139.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.139.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.139.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2880 skipping CVE-2022-2963 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2962 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2961 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2959 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2953 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2946 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2938 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2929 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2928 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2923 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2906 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2905 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2889 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2881 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2879 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2861 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2861 skipping CVE-2022-2874 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2873 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2869 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2868 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2867 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2862 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2860 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2860 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2859 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2859 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2858 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2858 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2857 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2857 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2856 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2856 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2855 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2855 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2854 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2854 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2853 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2853 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2852 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2852 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2850 skipping CVE-2022-2849 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2845 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2819 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2817 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2816 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2795 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2785 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2663 skipping CVE-2022-2719 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2639 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2624 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2624 skipping CVE-2022-2625 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2623 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2623 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2622 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2622 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2621 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2621 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2620 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2620 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2619 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2619 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2618 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2618 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2617 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2617 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2616 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2616 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2615 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2615 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2614 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2614 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2613 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2613 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2612 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2612 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2611 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2611 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2610 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2610 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2609 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2609 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2608 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2608 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2607 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2607 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2606 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2606 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2605 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2605 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2604 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2604 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2603 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2603 skipping CVE-2022-2602 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2601 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2598 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2588 skipping CVE-2022-2590 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2586 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2585 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2581 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2580 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2571 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2526 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2522 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2521 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2520 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2519 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2509 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2505 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2481 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2481 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2480 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2480 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2479 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2479 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2478 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2478 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2477 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2477 skipping CVE-2022-2476 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2469 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2385 skipping CVE-2022-2380 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2318 skipping CVE-2022-2345 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2344 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2343 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2327 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2320 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2319 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2309 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2301 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2301 skipping CVE-2022-2308 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2304 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2296 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2296 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2295 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2295 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2294 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2294 skipping CVE-2022-2289 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2288 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2287 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2286 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2285 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2284 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2274 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2264 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2257 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2255 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2231 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2211 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2210 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2209 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2208 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2207 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2206 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2200 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2196 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2165 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2165 skipping CVE-2022-2183 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2182 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2175 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2164 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2164 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2163 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2163 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2162 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2162 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2161 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2161 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2160 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2160 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2158 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2158 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2157 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2157 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2156 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2156 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2127 skipping CVE-2022-2153 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2132 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2129 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2121 skipping CVE-2022-2126 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2125 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2124 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2122 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2120 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2120 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2119 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2119 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-2084 skipping CVE-2022-2097 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2085 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2061 skipping CVE-2022-2078 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2068 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2058 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2057 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2056 as CVE page is older than CVRF-CVE file. CVE-2022-2048: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-2048: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-2048: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-2048: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-2048: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-2048: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-2048: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-2048: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-2048: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-2048: no packages for Container bci/openjdk:latest, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-2048: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-2048: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-2048: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-2048: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-2048: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-2048: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-2048: no packages for Container bci/openjdk:latest, but entry? CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-2048: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-2048: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-2048: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-2048: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-2048: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-2048: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-2048: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-2048: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-2048: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-2048: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-2048: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-2048: no packages for Container bci/openjdk:latest, but entry? CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-2048: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-2048: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-2048: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-2048: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-2048: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-2048: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-2048: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-2048: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-2048: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-2048: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-2047: no packages for Container bci/openjdk:latest, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-2047: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-2047: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-2047: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-2047: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-2047: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-2047: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-2047: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-2047: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-2047: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-2047: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-2047: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-2047: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-2047: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-2047: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-2047: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-2047: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-2047: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-2047: no packages for Container bci/openjdk:latest, but entry? CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-2047: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-2047: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-2047: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-2047: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-2047: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2022-2047: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-2047: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-2047: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2022-2047: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-2047: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-2047: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-2047: no packages for Container bci/openjdk:latest, but entry? CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-2047: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-2047: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-2047: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-2047: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-2047: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2022-2047: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2022-2047: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-2047: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-2047: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-2047: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2022-2047: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2011 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2011 skipping CVE-2022-2042 as CVE page is older than CVRF-CVE file. skipping CVE-2022-2031 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2010 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2010 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2008 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2008 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-2007 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-2007 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1996 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1996 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1996 skipping CVE-2022-2000 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1998 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1974 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1966 skipping CVE-2022-1973 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1972 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1968 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1962 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1949 CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-1941: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-1941: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-1941: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2022-1941 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2022-1941 CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-1941: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-1941: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-1941: no packages for SUSE Manager Server 4.2, but entry? CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1941: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1941: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2022-1941: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2022-1941: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2022-1941: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2022-1941: no packages for SUSE Manager Server 4.2, but entry? skipping CVE-2022-1943 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1942 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1927 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1925 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1924 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1923 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1922 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1921 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1920 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1876 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1876 skipping CVE-2022-1898 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1897 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1886 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1882 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1875 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1875 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1874 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1874 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1873 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1873 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1872 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1872 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1871 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1871 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1870 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1870 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1869 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1869 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1868 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1868 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1867 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1867 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1866 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1866 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1865 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1865 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1864 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1864 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1863 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1863 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1862 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1862 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1861 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1861 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1860 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1860 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1859 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1859 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1858 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1858 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1857 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1857 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1856 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1856 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1855 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1855 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1854 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1854 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1853 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1853 skipping CVE-2022-1852 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1851 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1798 skipping CVE-2022-1802 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1734 skipping CVE-2022-1796 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1789 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1785 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1771 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1769 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1736 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1735 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1729 skipping CVE-2022-1733 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1725 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1720 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1708 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1706 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1705 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1679 CVE-2022-1664: no packages for Container bci/rust:1.63-4.11, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-EC2, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-1664: no packages for Container suse/postgres:13.10-22.1, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2022-1664: no packages for Container suse/sles/15.7/virt-launcher:1.1.1.33.5, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-1664: no packages for Container suse/sles/15.6/virt-handler:1.1.1.24.478, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2022-1664: no packages for Container bci/golang:oldstable-openssl-34.5, but entry? CVE-2022-1664: no packages for Container bci/nodejs:16-7.1, but entry? CVE-2022-1664: no packages for Container bci/rust:1.79-1.4.3, but entry? CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal/5.4:latest, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.3.21.55, but entry? CVE-2022-1664: no packages for Container rancher/elemental-builder-image/5.3:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-1664: no packages for Container bci/php-fpm:8-31.4, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.4/toolbox:11.1-3.2.10, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/libguestfs-tools:0.58.0.17.143, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5.3.2, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.139, but entry? CVE-2022-1664: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry? CVE-2022-1664: no packages for Container bci/rust:1.80, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/virt-launcher:0.58.0.20.46, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2022-1664: no packages for Container bci/golang:1.21-2.34.5, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Basic, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-1664: no packages for Container bci/php-apache:8-4.1, but entry? CVE-2022-1664: no packages for Container suse/pcp:5.3.7-36.5, but entry? CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2022-1664: no packages for Container bci/php:8-4.1, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Container bci/openjdk:11-32.33, but entry? CVE-2022-1664: no packages for Container bci/rust:1.77, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-hub-xmlrpc-api:5.0.0-beta1.1.86, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.5:2.0.2-4.2.20, but entry? CVE-2022-1664: no packages for Container bci/rust:1.66, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.5/toolbox:12.1-2.2.1, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry? CVE-2022-1664: no packages for Container bci/golang:1.18-18.40, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.3:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container bci/ruby:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.4.24.39, but entry? CVE-2022-1664: no packages for Container suse/postgres:14.8-11.1, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2022-1664: no packages for Container bci/rust:oldstable-3.3, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-1664: no packages for Container bci/rust:1.60-6.35, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Container bci/php-fpm:8-4.1, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2022-1664: no packages for Container suse/rmt-mariadb:10.11-36.1, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Container suse/postgres:15, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.4, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-1664: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-1664: no packages for Container suse/postgres:16.2-36.4, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-tftpd:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-EC2, but entry? CVE-2022-1664: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.318, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Container bci/golang:1.16-30.88, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-EC2, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry? CVE-2022-1664: no packages for Container bci/golang:1.22, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container suse/sles/15.6/libguestfs-tools:1.1.1.23.352, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-GCE, but entry? CVE-2022-1664: no packages for Container bci/rust:1.61-7.35, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.5.6.1, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Container bci/golang:stable-openssl-34.5, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/cdi-importer:1.55.0.17.295, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Standard, but entry? CVE-2022-1664: no packages for Container bci/php:8-31.4, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.3/toolbox:11.1-5.2.37, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-1664: no packages for Container bci/rust:1.65, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1664: no packages for Container suse/rmt-server:2.17-17.3, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Container suse/nginx:1.21-36.4, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2022-1664: no packages for Container bci/nodejs:18-6.1, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-1664: no packages for Image SLES15-SP4, but entry? CVE-2022-1664: no packages for Container bci/spack:0.21.2-2.1, but entry? CVE-2022-1664: no packages for Container bci/nodejs:20-31.5, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-Azure, but entry? CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-httpd:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC, but entry? CVE-2022-1664: no packages for Container bci/rust:1.59-9.95, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-1664: no packages for Container suse/postgres:12.14-21.1, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-1664: no packages for Container bci/nodejs:14-35.31, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Container bci/rust:1.67, but entry? CVE-2022-1664: no packages for Container bci/python:3.11-42.5, but entry? CVE-2022-1664: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-1664: no packages for Container bci/python:3.9-20.43, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal/5.3:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6, but entry? CVE-2022-1664: no packages for Container bci/rust:1.62-5.2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-BYOS, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry? CVE-2022-1664: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.5, but entry? CVE-2022-1664: no packages for Container suse/sles/15.7/virt-handler:1.1.1.29.4, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Container suse/389-ds:2.2-36.3, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container suse/sles/15.6/virt-launcher:1.1.1.28.74, but entry? CVE-2022-1664: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-1664: no packages for Container suse/sles/15.7/libguestfs-tools:1.1.1.28.5, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Container bci/openjdk-devel:11-36.80, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/virt-handler:0.58.0.18.193, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2022-1664: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2022-1664: no packages for Container caasp/v4/cilium:1.6.6, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2022-1664: no packages for Container bci/php-apache:8-31.4, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Container bci/golang:oldstable-3.4, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-migration-14-16:5.0.0-beta1.2.185, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry? CVE-2022-1664: no packages for Container bci/rust:1.64, but entry? CVE-2022-1664: no packages for Container bci/golang:1.17-29.88, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-1664: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2022-1664: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2022-1664: no packages for Container suse/pcp:5, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2022-1664: no packages for Container bci/nodejs:12-17.65, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2022-1664: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-tftpd:5.0.0-beta1.2.90, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry? CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1664 CVE-2022-1664: no packages for Container bci/bci-init:15.3.21.55, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.4, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.4.24.39, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.5.6.1, but entry? CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry? CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5.3.2, but entry? CVE-2022-1664: no packages for Container bci/golang:1.16-30.88, but entry? CVE-2022-1664: no packages for Container bci/golang:1.17-29.88, but entry? CVE-2022-1664: no packages for Container bci/golang:1.18-18.40, but entry? CVE-2022-1664: no packages for Container bci/golang:1.21-2.34.5, but entry? CVE-2022-1664: no packages for Container bci/golang:1.22, but entry? CVE-2022-1664: no packages for Container bci/golang:oldstable-3.4, but entry? CVE-2022-1664: no packages for Container bci/golang:oldstable-openssl-34.5, but entry? CVE-2022-1664: no packages for Container bci/golang:stable-openssl-34.5, but entry? CVE-2022-1664: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-1664: no packages for Container bci/nodejs:12-17.65, but entry? CVE-2022-1664: no packages for Container bci/nodejs:14-35.31, but entry? CVE-2022-1664: no packages for Container bci/nodejs:16-7.1, but entry? CVE-2022-1664: no packages for Container bci/nodejs:18-6.1, but entry? CVE-2022-1664: no packages for Container bci/nodejs:20-31.5, but entry? CVE-2022-1664: no packages for Container bci/openjdk-devel:11-36.80, but entry? CVE-2022-1664: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-1664: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-1664: no packages for Container bci/openjdk:11-32.33, but entry? CVE-2022-1664: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-1664: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-1664: no packages for Container bci/php-apache:8-31.4, but entry? CVE-2022-1664: no packages for Container bci/php-apache:8-4.1, but entry? CVE-2022-1664: no packages for Container bci/php-fpm:8-31.4, but entry? CVE-2022-1664: no packages for Container bci/php-fpm:8-4.1, but entry? CVE-2022-1664: no packages for Container bci/php:8-31.4, but entry? CVE-2022-1664: no packages for Container bci/php:8-4.1, but entry? CVE-2022-1664: no packages for Container bci/python:3.11-42.5, but entry? CVE-2022-1664: no packages for Container bci/python:3.9-20.43, but entry? CVE-2022-1664: no packages for Container bci/ruby:latest, but entry? CVE-2022-1664: no packages for Container bci/rust:1.59-9.95, but entry? CVE-2022-1664: no packages for Container bci/rust:1.60-6.35, but entry? CVE-2022-1664: no packages for Container bci/rust:1.61-7.35, but entry? CVE-2022-1664: no packages for Container bci/rust:1.62-5.2, but entry? CVE-2022-1664: no packages for Container bci/rust:1.63-4.11, but entry? CVE-2022-1664: no packages for Container bci/rust:1.64, but entry? CVE-2022-1664: no packages for Container bci/rust:1.65, but entry? CVE-2022-1664: no packages for Container bci/rust:1.66, but entry? CVE-2022-1664: no packages for Container bci/rust:1.67, but entry? CVE-2022-1664: no packages for Container bci/rust:1.77, but entry? CVE-2022-1664: no packages for Container bci/rust:1.79-1.4.3, but entry? CVE-2022-1664: no packages for Container bci/rust:1.80, but entry? CVE-2022-1664: no packages for Container bci/rust:oldstable-3.3, but entry? CVE-2022-1664: no packages for Container bci/spack:0.21.2-2.1, but entry? CVE-2022-1664: no packages for Container caasp/v4/cilium:1.6.6, but entry? CVE-2022-1664: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry? CVE-2022-1664: no packages for Container rancher/elemental-builder-image/5.3:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.3:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal/5.3:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal/5.4:latest, but entry? CVE-2022-1664: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry? CVE-2022-1664: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry? CVE-2022-1664: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry? CVE-2022-1664: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry? CVE-2022-1664: no packages for Container suse/389-ds:2.2-36.3, but entry? CVE-2022-1664: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.5, but entry? CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-httpd:latest, but entry? CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-tftpd:latest, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-tftpd:5.0.0-beta1.2.90, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-hub-xmlrpc-api:5.0.0-beta1.1.86, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-migration-14-16:5.0.0-beta1.2.185, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-1664: no packages for Container suse/nginx:1.21-36.4, but entry? CVE-2022-1664: no packages for Container suse/pcp:5, but entry? CVE-2022-1664: no packages for Container suse/pcp:5.3.7-36.5, but entry? CVE-2022-1664: no packages for Container suse/postgres:12.14-21.1, but entry? CVE-2022-1664: no packages for Container suse/postgres:13.10-22.1, but entry? CVE-2022-1664: no packages for Container suse/postgres:14.8-11.1, but entry? CVE-2022-1664: no packages for Container suse/postgres:15, but entry? CVE-2022-1664: no packages for Container suse/postgres:16.2-36.4, but entry? CVE-2022-1664: no packages for Container suse/rmt-mariadb:10.11-36.1, but entry? CVE-2022-1664: no packages for Container suse/rmt-server:2.17-17.3, but entry? CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry? CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.318, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.139, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.3/toolbox:11.1-5.2.37, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.4/toolbox:11.1-3.2.10, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.5/toolbox:12.1-2.2.1, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.5:2.0.2-4.2.20, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/cdi-importer:1.55.0.17.295, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/libguestfs-tools:0.58.0.17.143, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/virt-handler:0.58.0.18.193, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/virt-launcher:0.58.0.20.46, but entry? CVE-2022-1664: no packages for Container suse/sles/15.6/libguestfs-tools:1.1.1.23.352, but entry? CVE-2022-1664: no packages for Container suse/sles/15.6/virt-handler:1.1.1.24.478, but entry? CVE-2022-1664: no packages for Container suse/sles/15.6/virt-launcher:1.1.1.28.74, but entry? CVE-2022-1664: no packages for Container suse/sles/15.7/libguestfs-tools:1.1.1.28.5, but entry? CVE-2022-1664: no packages for Container suse/sles/15.7/virt-handler:1.1.1.29.4, but entry? CVE-2022-1664: no packages for Container suse/sles/15.7/virt-launcher:1.1.1.33.5, but entry? CVE-2022-1664: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry? CVE-2022-1664: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry? CVE-2022-1664: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry? CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Basic, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Standard, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-1664: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2022-1664: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.3.21.55, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.4, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.4.24.39, but entry? CVE-2022-1664: no packages for Container bci/bci-init:15.5.6.1, but entry? CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5, but entry? CVE-2022-1664: no packages for Container bci/bci-sle15-kernel-module-devel:15.5.3.2, but entry? CVE-2022-1664: no packages for Container bci/golang:1.16-30.88, but entry? CVE-2022-1664: no packages for Container bci/golang:1.17-29.88, but entry? CVE-2022-1664: no packages for Container bci/golang:1.18-18.40, but entry? CVE-2022-1664: no packages for Container bci/golang:1.21-2.34.5, but entry? CVE-2022-1664: no packages for Container bci/golang:1.22, but entry? CVE-2022-1664: no packages for Container bci/golang:oldstable-3.4, but entry? CVE-2022-1664: no packages for Container bci/golang:oldstable-openssl-34.5, but entry? CVE-2022-1664: no packages for Container bci/golang:stable-openssl-34.5, but entry? CVE-2022-1664: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2022-1664: no packages for Container bci/nodejs:12-17.65, but entry? CVE-2022-1664: no packages for Container bci/nodejs:14-35.31, but entry? CVE-2022-1664: no packages for Container bci/nodejs:16-7.1, but entry? CVE-2022-1664: no packages for Container bci/nodejs:18-6.1, but entry? CVE-2022-1664: no packages for Container bci/nodejs:20-31.5, but entry? CVE-2022-1664: no packages for Container bci/openjdk-devel:11-36.80, but entry? CVE-2022-1664: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2022-1664: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2022-1664: no packages for Container bci/openjdk:11-32.33, but entry? CVE-2022-1664: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2022-1664: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2022-1664: no packages for Container bci/php-apache:8-31.4, but entry? CVE-2022-1664: no packages for Container bci/php-apache:8-4.1, but entry? CVE-2022-1664: no packages for Container bci/php-fpm:8-31.4, but entry? CVE-2022-1664: no packages for Container bci/php-fpm:8-4.1, but entry? CVE-2022-1664: no packages for Container bci/php:8-31.4, but entry? CVE-2022-1664: no packages for Container bci/php:8-4.1, but entry? CVE-2022-1664: no packages for Container bci/python:3.11-42.5, but entry? CVE-2022-1664: no packages for Container bci/python:3.9-20.43, but entry? CVE-2022-1664: no packages for Container bci/ruby:latest, but entry? CVE-2022-1664: no packages for Container bci/rust:1.59-9.95, but entry? CVE-2022-1664: no packages for Container bci/rust:1.60-6.35, but entry? CVE-2022-1664: no packages for Container bci/rust:1.61-7.35, but entry? CVE-2022-1664: no packages for Container bci/rust:1.62-5.2, but entry? CVE-2022-1664: no packages for Container bci/rust:1.63-4.11, but entry? CVE-2022-1664: no packages for Container bci/rust:1.64, but entry? CVE-2022-1664: no packages for Container bci/rust:1.65, but entry? CVE-2022-1664: no packages for Container bci/rust:1.66, but entry? CVE-2022-1664: no packages for Container bci/rust:1.67, but entry? CVE-2022-1664: no packages for Container bci/rust:1.77, but entry? CVE-2022-1664: no packages for Container bci/rust:1.79-1.4.3, but entry? CVE-2022-1664: no packages for Container bci/rust:1.80, but entry? CVE-2022-1664: no packages for Container bci/rust:oldstable-3.3, but entry? CVE-2022-1664: no packages for Container bci/spack:0.21.2-2.1, but entry? CVE-2022-1664: no packages for Container caasp/v4/cilium:1.6.6, but entry? CVE-2022-1664: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry? CVE-2022-1664: no packages for Container rancher/elemental-builder-image/5.3:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.3:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.3:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal/5.3:latest, but entry? CVE-2022-1664: no packages for Container rancher/elemental-teal/5.4:latest, but entry? CVE-2022-1664: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry? CVE-2022-1664: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry? CVE-2022-1664: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry? CVE-2022-1664: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry? CVE-2022-1664: no packages for Container suse/389-ds:2.2-36.3, but entry? CVE-2022-1664: no packages for Container suse/hpc/warewulf4-x86_64/sle-hpc-node:15.6.17.5.5, but entry? CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-httpd:latest, but entry? CVE-2022-1664: no packages for Container suse/manager/4.3/proxy-tftpd:latest, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/proxy-tftpd:5.0.0-beta1.2.90, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-hub-xmlrpc-api:5.0.0-beta1.1.86, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server-migration-14-16:5.0.0-beta1.2.185, but entry? CVE-2022-1664: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2022-1664: no packages for Container suse/nginx:1.21-36.4, but entry? CVE-2022-1664: no packages for Container suse/pcp:5, but entry? CVE-2022-1664: no packages for Container suse/pcp:5.3.7-36.5, but entry? CVE-2022-1664: no packages for Container suse/postgres:12.14-21.1, but entry? CVE-2022-1664: no packages for Container suse/postgres:13.10-22.1, but entry? CVE-2022-1664: no packages for Container suse/postgres:14.8-11.1, but entry? CVE-2022-1664: no packages for Container suse/postgres:15, but entry? CVE-2022-1664: no packages for Container suse/postgres:16.2-36.4, but entry? CVE-2022-1664: no packages for Container suse/rmt-mariadb:10.11-36.1, but entry? CVE-2022-1664: no packages for Container suse/rmt-server:2.17-17.3, but entry? CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.3:latest, but entry? CVE-2022-1664: no packages for Container suse/sle-micro-rancher/5.4:latest, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.318, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.139, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.3/toolbox:11.1-5.2.37, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.4/toolbox:11.1-3.2.10, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.5/toolbox:12.1-2.2.1, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/5.5:2.0.2-4.2.20, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/kvm-5.5:2.0.2-2.2.20, but entry? CVE-2022-1664: no packages for Container suse/sle-micro/rt-5.5:2.0.2-3.2.23, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/cdi-importer:1.55.0.17.295, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/libguestfs-tools:0.58.0.17.143, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/virt-handler:0.58.0.18.193, but entry? CVE-2022-1664: no packages for Container suse/sles/15.5/virt-launcher:0.58.0.20.46, but entry? CVE-2022-1664: no packages for Container suse/sles/15.6/libguestfs-tools:1.1.1.23.352, but entry? CVE-2022-1664: no packages for Container suse/sles/15.6/virt-handler:1.1.1.24.478, but entry? CVE-2022-1664: no packages for Container suse/sles/15.6/virt-launcher:1.1.1.28.74, but entry? CVE-2022-1664: no packages for Container suse/sles/15.7/libguestfs-tools:1.1.1.28.5, but entry? CVE-2022-1664: no packages for Container suse/sles/15.7/virt-handler:1.1.1.29.4, but entry? CVE-2022-1664: no packages for Container suse/sles/15.7/virt-launcher:1.1.1.33.5, but entry? CVE-2022-1664: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry? CVE-2022-1664: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry? CVE-2022-1664: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry? CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Basic-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-HPC-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-SAP-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-Azure-Standard-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-ECS-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-EC2-SAP-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-GCE-SAP-On-Demand, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Basic, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Azure-Standard, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-HPC-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-3-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-Micro-5-4-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAP-Hardened-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-HPC-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-Micro-5-5-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAP-Hardened-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-HPC-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAP-Hardened-GCE, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2022-1664: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP3-TERADATA, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Server 12 SP5, but entry? CVE-2022-1664: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP5, but entry? CVE-2022-1664: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2022-1664: no packages for openSUSE Leap Micro 5.3, but entry? skipping CVE-2022-1678 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1674 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1671 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1652 skipping CVE-2022-1651 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1641 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1640 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1639 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1638 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1637 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1636 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1635 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1634 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1633 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1615 skipping CVE-2022-1629 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1623 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1622 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1621 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1620 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1619 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1616 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1586 skipping CVE-2022-1587 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1552 skipping CVE-2022-1529 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1507 skipping CVE-2022-1508 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1501 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1500 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1499 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1498 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1497 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1496 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1495 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1494 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1493 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1493 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1492 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1491 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1490 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1489 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1488 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1487 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1486 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1485 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1484 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1483 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1482 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1481 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1480 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1479 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1478 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1477 skipping CVE-2022-1473 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1462 skipping CVE-2022-1434 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1420 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1415 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1381 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1364 skipping CVE-2022-1355 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1354 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1348 skipping CVE-2022-1350 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1343 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1328 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1314 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1314 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1313 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1312 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1311 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1310 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1310 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1309 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1308 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1307 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1306 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1305 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1305 skipping CVE-2022-1304 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1292 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-1271 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1271 skipping CVE-2022-1270 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1263 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1247 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1232 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1227 skipping CVE-2022-1215 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1210 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1205 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1204 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1184 skipping CVE-2022-1199 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1198 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1197 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1196 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1195 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1146 skipping CVE-2022-1183 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1160 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1158 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1154 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1145 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1144 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1143 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1142 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1141 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1139 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1138 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1138 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1137 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1136 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1135 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1134 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1133 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1132 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1131 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1130 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1129 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1128 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1127 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1125 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-1125 skipping CVE-2022-1122 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1116 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1115 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1114 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-1096 skipping CVE-2022-1097 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1053 skipping CVE-2022-1056 as CVE page is older than CVRF-CVE file. skipping CVE-2022-1055 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1050 skipping CVE-2022-1043 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1016 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-1012 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2022-1011 skipping CVE-2022-0998 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0980 skipping CVE-2022-0995 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0987 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0979 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0978 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0977 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0976 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0975 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0974 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0973 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0972 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0971 skipping CVE-2022-0959 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0943 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0924 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0909 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0908 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0907 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0891 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0865 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0860 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0856 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0854 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-0813 skipping CVE-2022-0843 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0809 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0808 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0807 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0806 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0805 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0804 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0803 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0802 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0801 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0800 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0799 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0798 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0797 no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-0797 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0796 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0795 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0794 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0793 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0792 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0791 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0790 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0789 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0730 skipping CVE-2022-0778 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0742 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0729 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0714 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0699 skipping CVE-2022-0696 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0685 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0670 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0669 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0667 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0646 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0635 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0629 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0617 skipping CVE-2022-0615 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0610 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0609 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0608 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0607 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0606 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0605 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0604 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0603 skipping CVE-2022-0586 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0585 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0583 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0582 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0581 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0572 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0562 skipping CVE-2022-0563 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0561 skipping CVE-2022-0554 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0547 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0534 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0530 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0529 skipping CVE-2022-0516 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0500 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0494 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0480 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0470 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0469 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0468 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0467 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0466 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0465 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0464 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0463 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0462 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0461 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0460 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0459 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0457 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0456 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0455 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0454 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0453 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0452 skipping CVE-2022-0443 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0433 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0417 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0413 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0408 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0407 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0396 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0393 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0392 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2022-0367 skipping CVE-2022-0382 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0368 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0361 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0359 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0358 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0351 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0311 skipping CVE-2022-0319 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0318 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0310 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0309 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0308 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0307 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0306 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0305 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0304 No V5 entry found for CVE-2022-0303 / /home/securitybot/prod/cve-database/cvelistV5/cves/2022/0xxxx/CVE-2022-0303.json:No such file or directory no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0303 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0302 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0301 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0300 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0298 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0297 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0296 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0295 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0294 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0293 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0292 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0291 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0290 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0289 skipping CVE-2022-0286 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0264 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0261 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0217 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0216 skipping CVE-2022-0213 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0204 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0185 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0175 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0171 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0168 as CVE page is older than CVRF-CVE file. skipping CVE-2022-0158 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2022-0155 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2022-0155 skipping CVE-2022-0156 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0135 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0120 skipping CVE-2022-0128 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0118 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0117 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0116 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0115 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0114 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0113 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0112 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0111 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0110 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0109 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2022-0108 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0108 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0107 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0106 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0105 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0104 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0103 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0102 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0101 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0100 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0099 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0098 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0097 no cpe found for SUSE Package Hub 15 SP3 in CVE-2022-0096 no entry found for CVE-2021-81810 / /home/securitybot/prod/cve-database/cvelist/2021/81xxxx/CVE-2021-81810.json:No such file or directory No V5 entry found for CVE-2021-81810 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/81xxxx/CVE-2021-81810.json:No such file or directory notsure where SUSE WebYast 1.3 is contained? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47620 skipping CVE-2021-47624 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47623 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47622 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47620.xml 2024-10-20 02:10:04.216761000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47620.xml.new 2024-10-29 01:50:22.231175000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-20T00:10:03Z + 41 + 2024-10-29T00:50:21Z current 2024-06-21T23:46:53Z - 2024-10-20T00:10:03Z + 2024-10-29T00:50:21Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3797,24 +3797,9 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4572,11 +4557,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure SUSE Real Time Module 15 SP6:kernel-devel-rt no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47619 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47619.xml 2024-10-20 02:10:05.036732000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47619.xml.new 2024-10-29 01:50:23.048030000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-20T00:10:04Z + 39 + 2024-10-29T00:50:22Z current 2024-06-20T23:45:16Z - 2024-10-20T00:10:04Z + 2024-10-29T00:50:22Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -170,6 +170,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2010,6 +2025,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4035,18 +4083,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4208,6 +4244,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2021-47618 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47617 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47616 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47615 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47614 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47613 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47612 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47611 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47610 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47609 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47608 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47607 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47606.xml 2024-10-17 01:57:27.875590000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47606.xml.new 2024-10-29 01:50:23.850996000 +0100 @@ -14,13 +14,13 @@ 1 - 33 - 2024-10-16T23:57:27Z + 34 + 2024-10-29T00:50:23Z current 2024-06-20T23:45:19Z - 2024-10-16T23:57:27Z + 2024-10-29T00:50:23Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -179,6 +179,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1662,6 +1677,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3363,6 +3411,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47600 skipping CVE-2021-47605 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47604 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47603 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47602 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47601 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47600.xml 2024-10-20 02:10:19.828498000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47600.xml.new 2024-10-29 01:50:24.612943000 +0100 @@ -14,13 +14,13 @@ 1 - 47 - 2024-10-20T00:10:19Z + 48 + 2024-10-29T00:50:24Z current 2024-06-20T23:45:20Z - 2024-10-20T00:10:19Z + 2024-10-29T00:50:24Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1828,6 +1828,36 @@ kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1 @@ -4324,6 +4354,36 @@ kernel-rt-5.14.21-150500.13.61.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -4477,18 +4537,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -5303,6 +5351,18 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.61.1 + + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 + SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source @@ -5323,10 +5383,6 @@ SUSE Linux Enterprise Server 12 SP5:kernel-macros SUSE Linux Enterprise Server 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Real Time Module 15 SP6:kernel-devel-rt SUSE Real Time Module 15 SP6:kernel-source-rt --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47599.xml 2024-10-16 02:14:47.302237000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47599.xml.new 2024-10-29 01:50:25.459991000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-16T00:14:46Z + 32 + 2024-10-29T00:50:24Z current 2024-06-20T23:45:20Z - 2024-10-16T00:14:46Z + 2024-10-29T00:50:24Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -126,6 +126,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1517,6 +1532,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3078,6 +3126,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47598 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47598.xml 2024-10-20 02:10:22.071910000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47598.xml.new 2024-10-29 01:50:26.258968000 +0100 @@ -14,13 +14,13 @@ 1 - 31 - 2024-10-20T00:10:20Z + 32 + 2024-10-29T00:50:25Z current 2024-06-20T23:45:20Z - 2024-10-20T00:10:20Z + 2024-10-29T00:50:25Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1600,18 +1600,180 @@ kernel-kvmsmall-vdso-5.14.21-150500.55.73.1 + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + + + kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 + kernel-livepatch-5_14_21-150400_24_128-default-1-150400.9.3.1 + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 + kernel-livepatch-5_14_21-150500_13_64-rt-1-150500.11.3.1 + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + kernel-livepatch-5_14_21-150500_55_73-default-1-150500.11.3.1 + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + + + kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1 + + kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + + + kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1 @@ -3604,6 +3766,168 @@ kernel-rt-5.14.21-150500.13.64.1 as a component of openSUSE Leap Micro 5.5 + + kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP4 + + + kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + + + kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP5 + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -3796,24 +4120,9 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-devel-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source-azure as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4545,6 +4854,62 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1 + + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_166-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_169-default-15-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_172-default-13-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_175-default-14-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_178-default-11-150200.2.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_138-default-15-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_141-default-14-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_144-default-13-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_147-default-13-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_150-default-12-150300.2.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_100-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_103-default-11-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_108-default-10-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_111-default-8-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_116-default-8-150400.9.8.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_119-default-7-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_122-default-5-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_125-default-3-150400.9.6.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_88-default-15-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_92-default-14-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_97-default-13-150400.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_18-rt-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_21-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_24-rt-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_27-rt-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_30-rt-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_35-rt-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_38-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_47-rt-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_52-rt-6-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_55-rt-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_58-rt-5-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_13_61-rt-3-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_28-default-15-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_31-default-14-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_36-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_39-default-13-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_44-default-12-150500.2.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_49-default-10-150500.11.8.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_52-default-8-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_59-default-8-150500.11.10.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_62-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_65-default-6-150500.11.6.1 + SUSE Linux Enterprise Live Patching 15 SP5:kernel-livepatch-5_14_21-150500_55_68-default-5-150500.11.6.1 + SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source @@ -4610,11 +4975,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure SUSE Real Time Module 15 SP6:kernel-devel-rt no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47597 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47597.xml 2024-10-20 02:10:23.130847000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47597.xml.new 2024-10-29 01:50:27.215805000 +0100 @@ -14,13 +14,13 @@ 1 - 38 - 2024-10-20T00:10:22Z + 39 + 2024-10-29T00:50:26Z current 2024-06-20T23:45:21Z - 2024-10-20T00:10:22Z + 2024-10-29T00:50:26Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -185,6 +185,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1838,6 +1853,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3850,6 +3898,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2021-47596 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47595 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47594 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47593 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47592 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47591 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47590 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47589 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47588.xml 2024-10-16 02:14:50.137542000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47588.xml.new 2024-10-29 01:50:28.005795000 +0100 @@ -14,13 +14,13 @@ 1 - 30 - 2024-10-16T00:14:49Z + 31 + 2024-10-29T00:50:27Z current 2024-06-20T23:45:23Z - 2024-10-16T00:14:49Z + 2024-10-29T00:50:27Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -148,6 +148,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1518,6 +1533,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3086,6 +3134,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47582 skipping CVE-2021-47587 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47586 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47585 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47584 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47583 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47582.xml 2024-10-20 02:10:36.562587000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47582.xml.new 2024-10-29 01:50:29.021695000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-20T00:10:36Z + 37 + 2024-10-29T00:50:28Z current 2024-06-20T23:45:24Z - 2024-10-20T00:10:36Z + 2024-10-29T00:50:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -149,6 +149,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1847,6 +1862,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3659,18 +3707,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -3837,6 +3873,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 @@ -4443,10 +4490,6 @@ SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel - SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47580 skipping CVE-2021-47581 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47580.xml 2024-10-20 02:10:38.207537000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47580.xml.new 2024-10-29 01:50:29.773697000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-20T00:10:37Z + 41 + 2024-10-29T00:50:29Z current 2024-06-20T23:45:24Z - 2024-10-20T00:10:37Z + 2024-10-29T00:50:29Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -182,6 +182,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2122,6 +2137,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4267,18 +4315,6 @@ kernel-default as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - kernel-default-base as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-default-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-devel as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - - - kernel-macros as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 - kernel-source as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5 @@ -4426,6 +4462,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47571 skipping CVE-2021-47579 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47578 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47577 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47576 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47575 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47574 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47573 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47572 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47570 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47569 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47568 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47567 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47559 skipping CVE-2021-47565 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47564 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47563 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47562 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47561 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47560 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47559.xml 2024-10-18 02:13:30.520552000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47559.xml.new 2024-10-29 01:50:31.551061000 +0100 @@ -14,13 +14,13 @@ 1 - 41 - 2024-10-18T00:13:27Z + 42 + 2024-10-29T00:50:31Z current 2024-05-27T23:38:28Z - 2024-10-18T00:13:27Z + 2024-10-29T00:50:31Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -126,6 +126,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1943,6 +1958,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4034,6 +4082,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47549 skipping CVE-2021-47558 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47557 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47556 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47555 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47554 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47553 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47552 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47551 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47550 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47549.xml 2024-10-22 03:12:45.144551000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47549.xml.new 2024-10-29 01:50:32.417198000 +0100 @@ -14,13 +14,13 @@ 1 - 34 - 2024-10-22T01:12:44Z + 35 + 2024-10-29T00:50:31Z current 2024-05-28T23:40:22Z - 2024-10-22T01:12:44Z + 2024-10-29T00:50:31Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -158,6 +158,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP3-BYOS-Azure @@ -2141,6 +2156,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure @@ -4428,6 +4476,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1 skipping CVE-2021-47548 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47547 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47546 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47544 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47542 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47542.xml 2024-10-22 03:12:50.630269000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47542.xml.new 2024-10-29 01:50:33.881943000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-22T01:12:50Z + 43 + 2024-10-29T00:50:33Z current 2024-05-28T23:40:24Z - 2024-10-22T01:12:50Z + 2024-10-29T00:50:33Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -151,6 +151,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2238,6 +2253,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4626,6 +4674,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2021-47541 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47540 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47539 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47538 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47537 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47536 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47535 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47534 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47533 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47532 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47531 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47530 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47529 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47528 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47516 skipping CVE-2021-47526 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47525 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47524 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47523 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47522 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47521 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47520 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47519 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47518 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47517 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47516.xml 2024-10-22 03:13:17.189373000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47516.xml.new 2024-10-29 01:50:34.932885000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-22T01:13:15Z + 41 + 2024-10-29T00:50:34Z current 2024-05-28T23:40:29Z - 2024-10-22T01:13:15Z + 2024-10-29T00:50:34Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -156,6 +156,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2222,6 +2237,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4600,6 +4648,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47506 skipping CVE-2021-47515 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47514 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47513 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47512 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47511 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47510 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47509 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47508 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47507 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47501 skipping CVE-2021-47505 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47504 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47503 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47502 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47501.xml 2024-10-22 03:13:31.947626000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47501.xml.new 2024-10-29 01:50:36.205860000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-22T01:13:30Z + 43 + 2024-10-29T00:50:35Z current 2024-05-27T23:38:33Z - 2024-10-22T01:13:30Z + 2024-10-29T00:50:35Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -131,6 +131,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2156,6 +2171,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4456,6 +4504,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47500 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47496 skipping CVE-2021-47499 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47498 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47497 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47495 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47494 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47493 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47492 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47491 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47490 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47489 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47488 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47483 skipping CVE-2021-47486 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47485 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47484 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47468 skipping CVE-2021-47482 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47481 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47480 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47479 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47478 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47477 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47476 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47475 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47474 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47473 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47472 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47471 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47470 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47469 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47468.xml 2024-10-22 03:14:12.950444000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47468.xml.new 2024-10-29 01:50:38.990695000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-22T01:14:12Z + 43 + 2024-10-29T00:50:38Z current 2024-05-27T23:38:38Z - 2024-10-22T01:14:12Z + 2024-10-29T00:50:38Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -176,6 +176,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2333,6 +2348,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4809,6 +4857,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47441 skipping CVE-2021-47467 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47466 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47465 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47464 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47463 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47462 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47461 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47460 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47459 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47458 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47457 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47456 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47455 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47454 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47453 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47452 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47451 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47450 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47449 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47448 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47447 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47446 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47445 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47444 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47443 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47442 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47441.xml 2024-10-22 03:14:39.053571000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47441.xml.new 2024-10-29 01:50:39.766642000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-22T01:14:38Z + 43 + 2024-10-29T00:50:39Z current 2024-05-24T23:46:04Z - 2024-10-22T01:14:38Z + 2024-10-29T00:50:39Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -230,6 +230,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2361,6 +2376,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4869,6 +4917,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47438 skipping CVE-2021-47440 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47439 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47438.xml 2024-10-22 03:14:42.118439000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47438.xml.new 2024-10-29 01:50:40.776094000 +0100 @@ -14,13 +14,13 @@ 1 - 47 - 2024-10-22T01:14:41Z + 48 + 2024-10-29T00:50:40Z current 2024-05-24T23:46:05Z - 2024-10-22T01:14:41Z + 2024-10-29T00:50:40Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2082,41 +2082,41 @@ ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4196,18 +4196,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47434 skipping CVE-2021-47437 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47436 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47435 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47425 skipping CVE-2021-47433 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47432 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47431 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47430 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47429 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47428 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47427 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47426 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47425.xml 2024-10-22 03:14:54.994263000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47425.xml.new 2024-10-29 01:50:41.977029000 +0100 @@ -14,13 +14,13 @@ 1 - 35 - 2024-10-22T01:14:54Z + 36 + 2024-10-29T00:50:41Z current 2024-05-24T23:46:07Z - 2024-10-22T01:14:54Z + 2024-10-29T00:50:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -127,6 +127,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP3-BYOS-Azure @@ -2182,6 +2197,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure @@ -4527,6 +4575,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47423 skipping CVE-2021-47424 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47422 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47421 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47420 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47419 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47418 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47417 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47416 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47415 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47414 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47413 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47412 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47408 skipping CVE-2021-47410 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47409 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47407 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47405 skipping CVE-2021-47406 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47405.xml 2024-10-22 03:15:15.188183000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47405.xml.new 2024-10-29 01:50:45.192027000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-22T01:15:14Z + 43 + 2024-10-29T00:50:44Z current 2024-05-24T23:46:08Z - 2024-10-22T01:15:14Z + 2024-10-29T00:50:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -134,6 +134,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2221,6 +2236,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4592,6 +4640,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47403 skipping CVE-2021-47404 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47403.xml 2024-10-22 03:15:17.235605000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47403.xml.new 2024-10-29 01:50:45.913897000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-22T01:15:16Z + 41 + 2024-10-29T00:50:45Z current 2024-05-24T23:46:08Z - 2024-10-22T01:15:16Z + 2024-10-29T00:50:45Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -118,6 +118,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1928,6 +1943,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -3957,6 +4005,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47402 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47402.xml 2024-10-22 03:15:18.182572000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47402.xml.new 2024-10-29 01:50:46.836088000 +0100 @@ -14,13 +14,13 @@ 1 - 40 - 2024-10-22T01:15:17Z + 41 + 2024-10-29T00:50:46Z current 2024-05-27T23:39:01Z - 2024-10-22T01:15:17Z + 2024-10-29T00:50:46Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1969,12 +1969,21 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1 @@ -2002,12 +2011,21 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 @@ -4204,6 +4222,24 @@ klp-build-0~20240731.edfe0bf-1.1 as a component of openSUSE Tumbleweed + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -5307,6 +5343,14 @@ openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.64.1 openSUSE Tumbleweed:klp-build-0~20240731.edfe0bf-1.1 + + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47399 skipping CVE-2021-47401 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47400 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47399.xml 2024-10-22 03:15:21.205397000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47399.xml.new 2024-10-29 01:50:47.630734000 +0100 @@ -14,13 +14,13 @@ 1 - 39 - 2024-10-22T01:15:20Z + 40 + 2024-10-29T00:50:47Z current 2024-05-27T23:39:02Z - 2024-10-22T01:15:20Z + 2024-10-29T00:50:47Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -183,6 +183,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2249,6 +2264,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4654,6 +4702,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47395 skipping CVE-2021-47398 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47397 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47396 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47395.xml 2024-10-22 03:15:24.474220000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47395.xml.new 2024-10-29 01:50:48.395752000 +0100 @@ -14,13 +14,13 @@ 1 - 39 - 2024-10-22T01:15:23Z + 40 + 2024-10-29T00:50:47Z current 2024-05-27T23:39:04Z - 2024-10-22T01:15:23Z + 2024-10-29T00:50:47Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -175,6 +175,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2241,6 +2256,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4638,6 +4686,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47388 skipping CVE-2021-47394 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47393 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47392 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47391 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47390 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47389 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47388.xml 2024-10-22 03:15:32.684303000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47388.xml.new 2024-10-29 01:50:49.580667000 +0100 @@ -14,13 +14,13 @@ 1 - 42 - 2024-10-22T01:15:32Z + 43 + 2024-10-29T00:50:48Z current 2024-05-24T23:46:09Z - 2024-10-22T01:15:32Z + 2024-10-29T00:50:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -143,6 +143,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2235,6 +2250,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4618,6 +4666,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47387 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47387.xml 2024-10-22 03:15:33.484236000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47387.xml.new 2024-10-29 01:50:50.398124000 +0100 @@ -14,13 +14,13 @@ 1 - 36 - 2024-10-22T01:15:32Z + 37 + 2024-10-29T00:50:49Z current 2024-05-27T23:39:06Z - 2024-10-22T01:15:32Z + 2024-10-29T00:50:49Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -164,6 +164,21 @@ Container suse/sle-micro/rt-5.5:2.0.4-4.5.76 + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP3-BYOS-Azure @@ -2132,6 +2147,39 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of Container suse/sle-micro/rt-5.5:2.0.4-4.5.76 + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.231.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure @@ -4425,6 +4473,17 @@ Container suse/sle-micro-rancher/5.4:latest:kernel-default-5.14.21-150400.24.122.2 Container suse/sle-micro/kvm-5.5:2.0.4-3.5.69:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 Container suse/sle-micro/rt-5.5:2.0.4-4.5.76:kernel-rt-5.14.21-150500.13.58.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.231.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.231.1 Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47383 skipping CVE-2021-47386 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47385 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47384 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47383.xml 2024-10-17 01:58:52.686612000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47383.xml.new 2024-10-29 01:50:51.182071000 +0100 @@ -14,13 +14,13 @@ 1 - 52 - 2024-10-16T23:58:52Z + 53 + 2024-10-29T00:50:50Z current 2024-05-24T23:46:10Z - 2024-10-16T23:58:52Z + 2024-10-29T00:50:50Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2229,12 +2229,21 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1 @@ -2268,12 +2277,21 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 @@ -2550,9 +2568,15 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-1-8.3.1 @@ -5094,6 +5118,30 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + kernel-default as a component of SUSE Linux Enterprise Micro 5.0 @@ -6171,6 +6219,16 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default SUSE Linux Enterprise Module for Basesystem 15 SP6:kernel-default-devel no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47378 skipping CVE-2021-47382 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47381 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47380 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47379 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47378.xml 2024-10-17 01:58:55.230465000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47378.xml.new 2024-10-29 01:50:52.250045000 +0100 @@ -14,13 +14,13 @@ 1 - 43 - 2024-10-16T23:58:54Z + 44 + 2024-10-29T00:50:51Z current 2024-05-24T23:46:11Z - 2024-10-16T23:58:54Z + 2024-10-29T00:50:51Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2072,12 +2072,21 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-1-150200.5.3.1 @@ -2105,12 +2114,21 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-1-150300.7.3.1 @@ -2324,9 +2342,15 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-1-8.3.1 @@ -4700,6 +4724,30 @@ kernel-rt-5.14.21-150500.13.58.1 as a component of openSUSE Leap Micro 5.5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + kernel-default-livepatch as a component of SUSE Linux Enterprise Live Patching 15 SP6 @@ -5766,6 +5814,16 @@ openSUSE Leap Micro 5.5:kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 openSUSE Leap Micro 5.5:kernel-rt-5.14.21-150500.13.58.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP6:kernel-default SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47375 skipping CVE-2021-47377 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47376 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47373 skipping CVE-2021-47374 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47373.xml 2024-10-22 03:15:46.971555000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47373.xml.new 2024-10-29 01:50:53.847986000 +0100 @@ -14,13 +14,13 @@ 1 - 35 - 2024-10-22T01:15:46Z + 36 + 2024-10-29T00:50:53Z current 2024-05-24T23:46:12Z - 2024-10-22T01:15:46Z + 2024-10-29T00:50:53Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -110,6 +110,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP4-BYOS @@ -1908,6 +1923,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.14.21-150400.24.122.2 as a component of Image SLES15-SP4-BYOS @@ -3841,6 +3889,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP4-BYOS:kernel-default-5.14.21-150400.24.122.2 Image SLES15-SP4-BYOS-Azure:kernel-default-5.14.21-150400.24.122.2 Image SLES15-SP4-BYOS-EC2:kernel-default-5.14.21-150400.24.122.2 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47372 skipping CVE-2021-47371 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47370 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47369 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47368 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47367 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47366 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47365 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47364 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47363 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47362 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47361 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47360 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47359 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47358 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47356 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47355 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47354 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47353 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47352 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47351 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47350 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47349 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47348 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47347 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47346 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47345 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47344 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47343 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47342 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47341.xml 2024-10-22 03:16:20.373265000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47341.xml.new 2024-10-29 01:50:55.480952000 +0100 @@ -14,13 +14,13 @@ 1 - 21 - 2024-10-22T01:16:19Z + 22 + 2024-10-29T00:50:54Z current 2024-05-22T23:39:47Z - 2024-10-22T01:16:19Z + 2024-10-29T00:50:54Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -150,6 +150,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP3-BYOS-Azure @@ -1210,6 +1225,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure @@ -2472,6 +2520,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1 skipping CVE-2021-47340 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47339 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47338 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47337 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47336 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47335 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47334 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47333 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47332 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47331 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47330 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47329 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47328 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47327 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47326 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47325 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47324 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47323 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47322 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47321 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47320 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47319 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47318 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47317 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47316 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47315 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47314 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47313 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47312 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47311 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47310 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47308 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47307 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47306 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47305 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47304 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47303 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47302 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47301 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47300 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47299 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47298 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47296 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47295.xml 2024-10-19 02:20:41.618681000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47295.xml.new 2024-10-29 01:50:57.071755000 +0100 @@ -14,13 +14,13 @@ 1 - 22 - 2024-10-19T00:20:41Z + 23 + 2024-10-29T00:50:56Z current 2024-05-22T23:39:56Z - 2024-10-19T00:20:41Z + 2024-10-29T00:50:56Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -79,6 +79,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -861,6 +876,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -1795,6 +1843,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2021-47293 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47292 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47291.xml 2024-10-22 03:17:07.700314000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47291.xml.new 2024-10-29 01:50:58.449729000 +0100 @@ -14,13 +14,13 @@ 1 - 21 - 2024-10-22T01:17:07Z + 22 + 2024-10-29T00:50:57Z current 2024-05-22T23:39:57Z - 2024-10-22T01:17:07Z + 2024-10-29T00:50:57Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -878,18 +878,33 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-6-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_194-default-3-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_197-default-2-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_200-default-1-150200.5.3.1 @@ -914,18 +929,33 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-6-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_164-default-3-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_167-default-2-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_170-default-1-150300.7.3.1 @@ -1532,6 +1562,36 @@ reiserfs-kmp-default-5.3.18-150300.59.170.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + kernel-default as a component of SUSE Linux Enterprise High Performance Computing 12 SP5 @@ -2273,6 +2333,18 @@ SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.170.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.170.1 + + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_191-default-7-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_194-default-4-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-3-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_161-default-7-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_164-default-4-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-3-150300.7.6.1 + SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-default SUSE Linux Enterprise High Performance Computing 12 SP5:kernel-source skipping CVE-2021-47290 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47289.xml 2024-10-22 03:17:09.390200000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47289.xml.new 2024-10-29 01:50:59.112687000 +0100 @@ -14,13 +14,13 @@ 1 - 20 - 2024-10-22T01:17:08Z + 21 + 2024-10-29T00:50:58Z current 2024-05-22T23:39:58Z - 2024-10-22T01:17:08Z + 2024-10-29T00:50:58Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -87,6 +87,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES15-SP3-BYOS-Azure @@ -1219,6 +1234,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + kernel-default-5.3.18-150300.59.164.1 as a component of Image SLES15-SP3-BYOS-Azure @@ -2687,6 +2735,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 Image SLES15-SP3-BYOS-Azure:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-EC2-HVM:kernel-default-5.3.18-150300.59.164.1 Image SLES15-SP3-BYOS-GCE:kernel-default-5.3.18-150300.59.164.1 skipping CVE-2021-47288 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47287 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47286 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47285 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47284 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47283 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47282 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47280 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47279 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47278 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47277 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47275 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47274 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47273 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47272 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47271 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47270 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47269 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47268 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47267 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47266 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47265 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47264 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47263 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47262 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47261 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47260 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47259 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47258 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47257.xml 2024-10-22 03:17:40.194634000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47257.xml.new 2024-10-29 01:51:00.854078000 +0100 @@ -14,13 +14,13 @@ 1 - 15 - 2024-10-22T01:17:39Z + 16 + 2024-10-29T00:51:00Z current 2024-05-22T23:40:05Z - 2024-10-22T01:17:39Z + 2024-10-29T00:51:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -60,6 +60,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + SUSE Enterprise Storage 7.1 @@ -364,6 +379,253 @@ openSUSE Leap 15.6 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + bpftool-4.18.0-553.16.1.el8_10 @@ -640,6 +902,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + bpftool-4.18.0-553.16.1.el8_10 as a component of SUSE Liberty Linux 8 @@ -1531,6 +1826,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 SUSE Liberty Linux 8:bpftool-4.18.0-553.16.1.el8_10 SUSE Liberty Linux 8:kernel-4.18.0-553.16.1.el8_10 SUSE Liberty Linux 8:kernel-abi-stablelists-4.18.0-553.16.1.el8_10 @@ -1736,6 +2042,229 @@ openSUSE Leap 15.6:ocfs2-kmp-default openSUSE Leap 15.6:reiserfs-kmp-default + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + skipping CVE-2021-47255 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47254 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47253 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47252 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47251 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47248 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47247 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47246 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47245 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47244 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47243 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47242 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47241 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47240 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47239 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47219 skipping CVE-2021-47237 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47236 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47235 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47234 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47233 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47232 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47231 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47230 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47229 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47228 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47227 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47226 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47225 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47224 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47223 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47222 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47221 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47220 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47219.xml 2024-10-22 03:18:22.911357000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47219.xml.new 2024-10-29 01:51:03.515893000 +0100 @@ -14,13 +14,13 @@ 1 - 51 - 2024-10-22T01:18:21Z + 52 + 2024-10-29T00:51:02Z current 2024-04-16T23:37:43Z - 2024-10-22T01:18:21Z + 2024-10-29T00:51:02Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -174,6 +174,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2316,6 +2331,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4768,6 +4816,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 skipping CVE-2021-47218 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47217 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47216 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47215 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47214 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47197 skipping CVE-2021-47212 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47211 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47210 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47209 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47207 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47206 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47205 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47204 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47203 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47202 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47201 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47200 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47199 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47198 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47197.xml 2024-10-22 03:18:48.795518000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47197.xml.new 2024-10-29 01:51:04.597880000 +0100 @@ -14,13 +14,13 @@ 1 - 44 - 2024-10-22T01:18:47Z + 45 + 2024-10-29T00:51:04Z current 2024-04-16T23:37:47Z - 2024-10-22T01:18:47Z + 2024-10-29T00:51:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -157,6 +157,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2001,6 +2016,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4024,6 +4072,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47194 skipping CVE-2021-47196 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47195 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47194.xml 2024-10-22 03:18:52.339301000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47194.xml.new 2024-10-29 01:51:05.824780000 +0100 @@ -14,13 +14,13 @@ 1 - 51 - 2024-10-22T01:18:51Z + 52 + 2024-10-29T00:51:04Z current 2024-04-16T23:37:48Z - 2024-10-22T01:18:51Z + 2024-10-29T00:51:04Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -136,6 +136,21 @@ Image SLES12-SP5-EC2-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -2324,6 +2339,39 @@ kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-EC2-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4754,6 +4802,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-EC2-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47191 skipping CVE-2021-47193 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47192 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47191.xml 2024-10-22 03:18:56.521598000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-47191.xml.new 2024-10-29 01:51:06.540768000 +0100 @@ -14,13 +14,13 @@ 1 - 55 - 2024-10-22T01:18:55Z + 56 + 2024-10-29T00:51:06Z current 2024-04-16T23:37:49Z - 2024-10-22T01:18:55Z + 2024-10-29T00:51:06Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2147,41 +2147,41 @@ ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-BYOS kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-On-Demand - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - cluster-md-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - dlm-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + dlm-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - gfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + gfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - kernel-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + kernel-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - ocfs2-kmp-default-4.12.14-122.222.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + ocfs2-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand cluster-md-kmp-default-4.12.14-122.225.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4294,18 +4294,18 @@ Image SLES12-SP5-EC2-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:kernel-default-4.12.14-122.222.1 Image SLES12-SP5-EC2-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.225.1 Image SLES12-SP5-GCE-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.222.1 - Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.222.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.225.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:cluster-md-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:dlm-kmp-default-4.12.14-122.225.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:gfs2-kmp-default-4.12.14-122.225.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47183 skipping CVE-2021-47190 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47189 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47188 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47187 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47186 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47185 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47184 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-47182 skipping CVE-2021-47181 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47180 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47179 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47178 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47177 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47176 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47175 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47174 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47173 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47172 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47171 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47170 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47169 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47168 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47167 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47166 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47165 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47164 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47162 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47161 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47160 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47159 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47158 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47153 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47152 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47151 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47150 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47149 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47148 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47147 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47144 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47143 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47142 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47141 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47140 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47139 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47138 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47137 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47136 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47135 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47134 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47133 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47132 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47130 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47129 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47128 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47127 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47126 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47125 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47124 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47123 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47122 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47121 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47120 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47119 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47118 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47117 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47116 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47114 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47113 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47112 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47111 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47110 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47109 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47108 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47107 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47106 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47105 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47104 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47102 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47101 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47100 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47099 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47098 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47097 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47096 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47095 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47094 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47093 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47092 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47091 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47090 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47089 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47088 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47087 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47086 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47084 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47083 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47082 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47081 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47080 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47079 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47078 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47077 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47076 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47075 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47074 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47073 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47072 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47071 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47070 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47069 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47068 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47067 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47066 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47065 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47064 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47063 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47062 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47061 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47060 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47059 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47058 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47057 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47056 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47055 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47054 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47053 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47052 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47051 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47050 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47049 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47048 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47047 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47046 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47045 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47044 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47043 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47042 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47041 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47040 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47039 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47038 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47037 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47036 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47035 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47034 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47033 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47032 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47031 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47030 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47029 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47028 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47027 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47026 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47025 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47024 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47023 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47022 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47021 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47020 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47019 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47018 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47017 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47016 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47015 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47014 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47013 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47012 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47011 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47010 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47009 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47008 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47007 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47006 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47005 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47004 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47003 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47002 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47001 as CVE page is older than CVRF-CVE file. skipping CVE-2021-47000 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46999 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46998 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46997 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46996 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46995 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46994 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46993 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46992 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46991 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46990 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46989 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46988 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46987 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46986 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46985 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46984 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46983 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46982 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46981 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46980 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46979 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46978 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46977 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46976 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46975 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46974 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46973 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46972 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46971 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46970 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46969 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46968 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46967 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46966 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46965 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46964 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46962 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46961 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46960 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46959 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46958 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46957 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46956 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-46955.xml 2024-10-22 03:22:53.309197000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-46955.xml.new 2024-10-29 01:51:12.717922000 +0100 @@ -14,13 +14,13 @@ 1 - 47 - 2024-10-22T01:22:52Z + 48 + 2024-10-29T00:51:12Z current 2024-02-29T00:38:52Z - 2024-10-22T01:22:52Z + 2024-10-29T00:51:12Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1343,9 +1343,15 @@ kernel-livepatch-5_3_18-150200_24_183-default-8-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_188-default-7-150200.5.6.1 + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + kernel-livepatch-5_3_18-150200_24_191-default-1-150200.5.3.1 @@ -1379,9 +1385,15 @@ kernel-livepatch-5_3_18-150300_59_153-default-8-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_158-default-7-150300.7.6.1 + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + kernel-livepatch-5_3_18-150300_59_161-default-1-150300.7.3.1 @@ -1535,9 +1547,15 @@ kgraft-patch-4_12_14-122_201-default-8-8.10.1 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 + kgraft-patch-4_12_14-122_216-default-6-8.6.1 + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 + kgraft-patch-4_12_14-122_219-default-1-8.3.1 @@ -2513,6 +2531,24 @@ kernel-default-extra-4.12.14-122.219.1 as a component of SUSE Linux Enterprise Workstation Extension 12 SP5 + + kgraft-patch-4_12_14-122_201-default-9-8.10.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kgraft-patch-4_12_14-122_216-default-7-8.6.1 as a component of SUSE Linux Enterprise Live Patching 12 SP5 + + + kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP2 + + + kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + + + kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 as a component of SUSE Linux Enterprise Live Patching 15 SP3 + kernel-default as a component of SUSE CaaS Platform 4.0 @@ -3494,6 +3530,14 @@ SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.219.1 SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.219.1 + + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_201-default-9-8.10.1 + SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_216-default-7-8.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_183-default-9-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_188-default-8-150200.5.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_153-default-9-150300.7.6.1 + SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_158-default-8-150300.7.6.1 + SUSE CaaS Platform 4.0:kernel-default SUSE CaaS Platform 4.0:kernel-default-base skipping CVE-2021-46954 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46953 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46952 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46951 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46950 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46949 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46948 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46947 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46946 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46945 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46944 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46943 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46942 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46941 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46940 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46939 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46938 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46937 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46936 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46935 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46934 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46933 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46932 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46931 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46930 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46929 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46928 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46927 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46926 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46925 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46924 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46923 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46922 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46920 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46919 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46918 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46917 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46916 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-46898 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-46898 skipping CVE-2021-46914 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46913 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46912 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46911 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46910 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46909 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46908 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46907 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46906 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46905 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46904 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46848 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46829 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46828 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46822 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46784 skipping CVE-2021-46774 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46766 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46744 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46705 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46668 skipping CVE-2021-46669 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46665 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46664 skipping CVE-2021-46663 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46661 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46659 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46658 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46657 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-46310 skipping CVE-2021-46312 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46283 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46195 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46174 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46101 as CVE page is older than CVRF-CVE file. skipping CVE-2021-46059 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-45958 skipping CVE-2021-45985 as CVE page is older than CVRF-CVE file. skipping CVE-2021-45960 as CVE page is older than CVRF-CVE file. skipping CVE-2021-45942 as CVE page is older than CVRF-CVE file. skipping CVE-2021-45931 as CVE page is older than CVRF-CVE file. skipping CVE-2021-45930 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-45710 no cpe found for SUSE Package Hub 15 SP6 in CVE-2021-45710 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-45463 skipping CVE-2021-45480 as CVE page is older than CVRF-CVE file. skipping CVE-2021-45469 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45452 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-45417 skipping CVE-2021-45402 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45342 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-45342 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45341 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-45341 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45116 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-45115 skipping CVE-2021-45100 as CVE page is older than CVRF-CVE file. skipping CVE-2021-45083 as CVE page is older than CVRF-CVE file. skipping CVE-2021-45082 as CVE page is older than CVRF-CVE file. skipping CVE-2021-45079 as CVE page is older than CVRF-CVE file. skipping CVE-2021-45078 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44964 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-44879 skipping CVE-2021-44906 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-44847 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-44847 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44847 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44758 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44758 skipping CVE-2021-44790 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44543 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44543 skipping CVE-2021-44648 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44647 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44577 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44576 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44575 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44574 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44573 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44571 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44570 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44569 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44568 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44542 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44542 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44541 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44541 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44540 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-44540 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-44420 skipping CVE-2021-44269 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-44227 skipping CVE-2021-44224 as CVE page is older than CVRF-CVE file. skipping CVE-2021-44038 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43980 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43859 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-43815 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-43815 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-43813 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-43813 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-43798 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-43798 skipping CVE-2021-43809 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-43797 skipping CVE-2021-43618 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-43579 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-43565 skipping CVE-2021-43546 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43545 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43544 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43543 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43542 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43541 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43540 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43539 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43538 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43537 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43536 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43535 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43534 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43533 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43532 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43531 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43530 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43529 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43528 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43527 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43519 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43400 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43389 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43317 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43316 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43315 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43314 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43313 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43312 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-43311 skipping CVE-2021-43267 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43138 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43085 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43057 as CVE page is older than CVRF-CVE file. skipping CVE-2021-43056 as CVE page is older than CVRF-CVE file. skipping CVE-2021-42762 as CVE page is older than CVRF-CVE file. skipping CVE-2021-42740 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-42717 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-42717 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-42716 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-42574 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42550 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42523 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42386 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42385 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42384 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42383 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42382 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42381 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42380 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42379 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42378 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42377 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42376 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42375 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42374 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-42373 skipping CVE-2021-42340 as CVE page is older than CVRF-CVE file. skipping CVE-2021-42327 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-42097 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-42097 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-42096 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-42073 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-42072 skipping CVE-2021-42013 as CVE page is older than CVRF-CVE file. skipping CVE-2021-41991 as CVE page is older than CVRF-CVE file. skipping CVE-2021-41990 as CVE page is older than CVRF-CVE file. skipping CVE-2021-41819 as CVE page is older than CVRF-CVE file. skipping CVE-2021-41817 as CVE page is older than CVRF-CVE file. skipping CVE-2021-41816 as CVE page is older than CVRF-CVE file. skipping CVE-2021-41773 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2021-41741 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/41xxxx/CVE-2021-41741.json:No such file or directory no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41741 skipping CVE-2021-41617 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-41556 skipping CVE-2021-41524 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-41495 skipping CVE-2021-41411 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-41259 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41259 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-41259 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-41244 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-41244 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41241 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41239 skipping CVE-2021-41229 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-41190 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41190 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-41179 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-41179 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41179 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-41178 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-41178 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41178 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-41177 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-41177 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41177 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-41174 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-41174 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-41160 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-41159 skipping CVE-2021-41136 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-41133 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-41116 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-41072 skipping CVE-2021-41073 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-40985 skipping CVE-2021-41035 as CVE page is older than CVRF-CVE file. notsure where SUSE Linux Enterprise Module for Package Hub 15 SP2 is contained? skipping CVE-2021-40633 as CVE page is older than CVRF-CVE file. skipping CVE-2021-40528 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-40516 skipping CVE-2021-40490 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-40426 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-40426 skipping CVE-2021-40438 as CVE page is older than CVRF-CVE file. skipping CVE-2021-40348 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-40325 skipping CVE-2021-40330 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-40324 skipping CVE-2021-40323 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-40153 skipping CVE-2021-40211 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39929 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39928 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39926 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39925 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39924 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39923 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39922 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39921 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39920 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39802 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39801 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39800 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39792 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39735 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39725 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39715 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39714 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39698 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39686 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39685 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39656 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39636 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39537 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39365 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39359 as CVE page is older than CVRF-CVE file. skipping CVE-2021-39275 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-39214 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-39214 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-39191 skipping CVE-2021-39212 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39154 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39152 skipping CVE-2021-39153 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39151 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39149 skipping CVE-2021-39150 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39148 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39146 skipping CVE-2021-39147 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39145 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39141 skipping CVE-2021-39144 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-39140 skipping CVE-2021-39139 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38604 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38593 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38578 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38510 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38509 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38508 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38507 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38506 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38505 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38504 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38503 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38501 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38500 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38499 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38498 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38497 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38496 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-38385 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38385 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38297 skipping CVE-2021-38300 as CVE page is older than CVRF-CVE file. notsure where SUSE Linux Enterprise Module for Package Hub 15 SP1 is contained? notsure where SUSE Linux Enterprise Module for Package Hub 15 is contained? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38291 skipping CVE-2021-38209 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38207 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38206 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38205 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38203 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38202 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38201 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38200 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38199 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38185 as CVE page is older than CVRF-CVE file. skipping CVE-2021-38166 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38094 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38091 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-38090 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38022 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38021 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38020 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38019 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38018 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38017 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38016 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38015 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38014 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38013 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38012 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38011 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38010 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38009 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38008 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38007 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38006 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38005 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38003 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38002 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38001 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-38000 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37999 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37998 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37997 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37996 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37995 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37994 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37993 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37992 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37991 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37990 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37989 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37988 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37987 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37986 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37985 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37984 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37983 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37982 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37981 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37976 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37975 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37974 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37973 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37972 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37971 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37970 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37969 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37968 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37967 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37966 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37965 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37964 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37963 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37962 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37961 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37960 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37959 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37958 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37957 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37956 skipping CVE-2021-37750 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37692 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37691 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37690 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37689 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37688 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37687 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37686 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37685 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37684 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37683 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37682 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37681 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37680 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37679 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37678 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37677 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37676 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37675 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37674 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37673 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37672 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37671 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37670 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37669 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37668 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37667 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37666 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37665 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37664 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37663 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37662 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37661 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37660 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37659 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37658 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37657 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37656 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37655 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37654 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37653 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37652 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37651 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37650 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37649 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37648 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37647 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37646 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37645 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37644 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37643 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37642 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37641 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37640 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37639 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37638 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37637 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37636 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37635 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-37601 skipping CVE-2021-37623 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37622 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37621 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37620 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37619 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37618 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37616 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37615 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37600 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37577 as CVE page is older than CVRF-CVE file. CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-37533: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-37533: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-37533: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-37533: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-37533: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-37533: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-37533: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-37533: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-37533: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-37533: no packages for Container bci/openjdk:latest, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-37533: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-37533: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-37533: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-37533: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-37533: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-37533: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-37533: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-37533: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-37533: no packages for Container bci/openjdk:latest, but entry? CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-37533: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-37533: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-37533: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-37533: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-37533: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-37533: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-37533: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-37533: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-37533: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-37533: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-37533: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-37533: no packages for Container bci/openjdk:latest, but entry? CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-37533: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-37533: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-37533: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-37533: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-37533: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-37533: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-37533: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-37533: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-37533: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-37533: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2021-37322 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37137 as CVE page is older than CVRF-CVE file. skipping CVE-2021-37136 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-36977 skipping CVE-2021-36980 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36978 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36976 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36770 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-36740 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-36690 skipping CVE-2021-36493 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36386 as CVE page is older than CVRF-CVE file. CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-36374: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-36374: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-36374: no packages for Container bci/openjdk:latest, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-36374: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-36374: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-36374: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-36374: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-36374: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-36374: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-36374: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-36374: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-36374: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-36374: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-36374: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-36374: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-36374: no packages for Container bci/openjdk:latest, but entry? CVE-2021-36374: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-36374: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-36374: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-36374: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-36374: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-36374: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-36374: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-36374: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-36374: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-36374: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-36374: no packages for Container bci/openjdk:latest, but entry? CVE-2021-36374: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-36374: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-36374: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-36374: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-36374: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-36374: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-36374: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-36374: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-36374: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-36373: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36373: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-36373: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-36373: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-36373: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-36373: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-36373: no packages for Container bci/openjdk:latest, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-36373: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-36373: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-36373: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-36373: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-36373: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-36373: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-36373: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-36373: no packages for Container bci/openjdk:latest, but entry? CVE-2021-36373: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-36373: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-36373: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-36373: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-36373: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-36373: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-36373: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-36373: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-36373: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-36373: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-36373: no packages for Container bci/openjdk:latest, but entry? CVE-2021-36373: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-36373: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-36373: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-36373: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-36373: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-36373: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-36373: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-36373: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-36373: no packages for SUSE Manager Server 4.2, but entry? skipping CVE-2021-36370 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36368 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36222 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36217 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36160 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36087 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36086 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36085 as CVE page is older than CVRF-CVE file. skipping CVE-2021-36084 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35942 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35939 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35938 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35937 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35619 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35604 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35603 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35588 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35578 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35567 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35561 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35560 as CVE page is older than CVRF-CVE file. skipping CVE-2021-35550 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2021-35409 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/35xxxx/CVE-2021-35409.json:No such file or directory no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-35409 skipping CVE-2021-35465 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2021-35373 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/35xxxx/CVE-2021-35373.json:No such file or directory No V5 entry found for CVE-2021-35057 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/35xxxx/CVE-2021-35057.json:No such file or directory skipping CVE-2021-35039 as CVE page is older than CVRF-CVE file. skipping CVE-2021-34866 as CVE page is older than CVRF-CVE file. skipping CVE-2021-34798 as CVE page is older than CVRF-CVE file. skipping CVE-2021-34557 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-34550 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-34550 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-34549 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-34549 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-34548 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-34548 skipping CVE-2021-34406 as CVE page is older than CVRF-CVE file. skipping CVE-2021-34403 as CVE page is older than CVRF-CVE file. skipping CVE-2021-34402 as CVE page is older than CVRF-CVE file. skipping CVE-2021-34401 as CVE page is older than CVRF-CVE file. skipping CVE-2021-34335 as CVE page is older than CVRF-CVE file. skipping CVE-2021-34334 as CVE page is older than CVRF-CVE file. skipping CVE-2021-34183 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-34055 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-34055 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-33844 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-33844 CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-33813: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-33813: no packages for Container bci/openjdk-devel:17-18.15, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for SUSE Manager Server 4.3, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-33813: no packages for Container bci/openjdk-devel:11-16.17, but entry? CVE-2021-33813: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-33813: no packages for Container bci/openjdk:latest, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-33813: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33813 CVE-2021-33813: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-33813: no packages for Container bci/openjdk-devel:11-16.17, but entry? CVE-2021-33813: no packages for Container bci/openjdk-devel:17-18.15, but entry? CVE-2021-33813: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-33813: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-33813: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-33813: no packages for Container bci/openjdk:latest, but entry? CVE-2021-33813: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-33813: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-33813: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2021-33813: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-33813: no packages for SUSE Manager Server 4.3, but entry? CVE-2021-33813: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-33813: no packages for Container bci/openjdk-devel:11-16.17, but entry? CVE-2021-33813: no packages for Container bci/openjdk-devel:17-18.15, but entry? CVE-2021-33813: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-33813: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-33813: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-33813: no packages for Container bci/openjdk:latest, but entry? CVE-2021-33813: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-33813: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-33813: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-33813: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-33813: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-33813: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-33813: no packages for SUSE Manager Proxy 4.3, but entry? CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-33813: no packages for SUSE Manager Retail Branch Server 4.3, but entry? CVE-2021-33813: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-33813: no packages for SUSE Manager Server 4.3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33655 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33631 skipping CVE-2021-33630 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33621 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-33571 skipping CVE-2021-33574 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-33516 CVE-2021-33503: no packages for SUSE Linux Enterprise Module for Web and Scripting 12, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP3, but entry? CVE-2021-33503: no packages for SUSE OpenStack Cloud 7, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP3, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise Module for Web and Scripting 12, but entry? CVE-2021-33503: no packages for SUSE OpenStack Cloud 7, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP3, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP4, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise High Availability Extension 12 SP5, but entry? CVE-2021-33503: no packages for SUSE Linux Enterprise Module for Web and Scripting 12, but entry? CVE-2021-33503: no packages for SUSE OpenStack Cloud 7, but entry? skipping CVE-2021-33515 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-33477 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-33477 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-33293 skipping CVE-2021-33294 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-33203 skipping CVE-2021-33193 as CVE page is older than CVRF-CVE file. skipping CVE-2021-33155 as CVE page is older than CVRF-CVE file. skipping CVE-2021-33139 as CVE page is older than CVRF-CVE file. skipping CVE-2021-33135 as CVE page is older than CVRF-CVE file. skipping CVE-2021-33114 as CVE page is older than CVRF-CVE file. skipping CVE-2021-33113 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-33061 skipping CVE-2021-33034 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32920 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32920 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32919 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32919 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32918 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32918 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32917 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32917 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-32837 skipping CVE-2021-32815 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32802 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32802 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32802 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32801 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32801 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32801 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32800 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32800 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32800 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-32798 no cpe found for SUSE Package Hub 15 SP6 in CVE-2021-32798 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-32797 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32766 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32766 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32766 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32765 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32765 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-32751 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32749 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32749 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32749 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32743 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32743 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32743 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32741 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32741 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32741 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32739 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32739 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32739 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32734 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32734 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32734 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32726 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32726 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32726 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32725 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32725 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32725 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32705 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32705 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32705 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32703 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32703 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32703 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32688 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32688 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32688 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32680 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32680 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32680 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32679 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32679 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32679 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-32678 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32678 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32678 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32635 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32635 skipping CVE-2021-32617 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-32610 skipping CVE-2021-32606 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32436 skipping CVE-2021-32490 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32435 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32434 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-32280 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32280 skipping CVE-2021-32292 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-32142 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-32142 skipping CVE-2021-32256 as CVE page is older than CVRF-CVE file. skipping CVE-2021-32078 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-32055 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-32052 skipping CVE-2021-32029 as CVE page is older than CVRF-CVE file. skipping CVE-2021-32028 as CVE page is older than CVRF-CVE file. skipping CVE-2021-32027 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-32000 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-31998 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-31998 skipping CVE-2021-31829 as CVE page is older than CVRF-CVE file. skipping CVE-2021-31826 as CVE page is older than CVRF-CVE file. notsure where WebYaST for SLE-11 is contained? notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP3 is contained? notsure where SUSE Linux Enterprise Module for Transactional Server 15 SP2 is contained? skipping CVE-2021-31795 as CVE page is older than CVRF-CVE file. skipping CVE-2021-31618 as CVE page is older than CVRF-CVE file. skipping CVE-2021-31615 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-31566 skipping CVE-2021-31523 as CVE page is older than CVRF-CVE file. skipping CVE-2021-31440 as CVE page is older than CVRF-CVE file. skipping CVE-2021-31292 as CVE page is older than CVRF-CVE file. skipping CVE-2021-31291 as CVE page is older than CVRF-CVE file. skipping CVE-2021-31239 as CVE page is older than CVRF-CVE file. skipping CVE-2021-31215 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30897 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30890 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30889 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30888 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30887 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30884 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30860 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30858 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30851 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30849 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30848 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30846 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30836 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30823 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30818 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30809 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30799 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30797 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30795 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30762 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30761 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30758 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30749 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30744 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30734 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30720 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30689 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30682 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30666 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30665 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30663 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30661 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30641 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30633 skipping CVE-2021-30639 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30632 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30631 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30630 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30629 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30628 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30627 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30626 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30625 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30624 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30623 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30622 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30621 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30620 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30619 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30618 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30617 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30616 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30615 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30614 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30613 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30612 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30611 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30610 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30609 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30608 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30607 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30606 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30604 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30603 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30602 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30601 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30600 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30599 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30598 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30597 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30596 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30594 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30593 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30592 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30591 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30590 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30589 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30588 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30585 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30584 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30582 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30581 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30579 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30578 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30577 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30576 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30575 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30574 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30573 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30572 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30571 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30569 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30568 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30567 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30566 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30565 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30564 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30563 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30562 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30561 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30559 skipping CVE-2021-30560 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30557 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30556 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30555 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30554 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30553 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30552 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30551 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30550 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30549 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30548 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30547 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30546 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30545 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30544 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30541 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30540 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30539 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30538 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30537 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30536 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30535 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30534 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30533 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30532 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30531 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30530 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30529 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30528 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30527 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30526 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30525 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30524 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30523 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30522 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-30521 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-30501 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-30500 skipping CVE-2021-30499 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30498 as CVE page is older than CVRF-CVE file. skipping CVE-2021-30178 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-30145 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-30004 skipping CVE-2021-29989 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29988 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29986 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29985 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29984 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29980 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29977 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29976 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29975 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29974 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29973 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29972 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29971 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29970 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29969 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29967 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29966 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29965 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29964 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29963 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29962 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29961 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29960 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29959 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29952 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29951 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29921 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29657 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29649 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29648 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29646 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29623 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29509 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29505 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-29495 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-29495 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-29472 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-29472 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-29472 skipping CVE-2021-29473 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29470 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29464 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29463 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-29457 skipping CVE-2021-29458 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-29429 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-29428 CVE-2021-29425: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-29425: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-29425: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-29425: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-29425: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2021-29425: no packages for Container bci/openjdk:latest, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-29425: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-29425: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-29425: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-29425: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-29425: no packages for Container bci/openjdk:latest, but entry? CVE-2021-29425: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-29425: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-29425: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-29425: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-29425: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-29425: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-29425: no packages for Container bci/openjdk:latest, but entry? CVE-2021-29425: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-29425: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-29425: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-29425: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-29425: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-29425: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-29425: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-29425: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-29424 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-29424 skipping CVE-2021-29390 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29266 as CVE page is older than CVRF-CVE file. skipping CVE-2021-29157 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-29136 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-29136 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-29133 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-29133 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-29133 skipping CVE-2021-28965 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28952 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28951 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28906 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28905 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28904 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28903 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28902 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-28899 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-28899 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28861 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28831 skipping CVE-2021-28713 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28712 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28711 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28710 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28703 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28691 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28657 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-28429 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-28421 skipping CVE-2021-28375 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28363 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-28237 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-28237 skipping CVE-2021-28153 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-28091 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-28090 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-28089 skipping CVE-2021-28041 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28039 as CVE page is older than CVRF-CVE file. skipping CVE-2021-28025 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-27927 CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-27906: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-27906: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-27906: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-27906: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-27906: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-27906: no packages for Container bci/openjdk:latest, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-27906: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-27906: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-27906: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-27906: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-27906: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-27906: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-27906: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-27906: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-27906: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-27906: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-27906: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-27906: no packages for Container bci/openjdk:latest, but entry? CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-27906: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-27906: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-27906: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-27906: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-27906: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-27906: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-27906: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-27906: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-27906: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-27906: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-27906: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-27906: no packages for Container bci/openjdk:latest, but entry? CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-27906: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-27906: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-27906: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-27906: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-27906: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-27906: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-27906: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-27906: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-27906: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-27906: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2021-27862 as CVE page is older than CVRF-CVE file. skipping CVE-2021-27861 as CVE page is older than CVRF-CVE file. skipping CVE-2021-27854 as CVE page is older than CVRF-CVE file. skipping CVE-2021-27853 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-27836 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-27836 skipping CVE-2021-27845 as CVE page is older than CVRF-CVE file. CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-27807: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-27807: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-27807: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-27807: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-27807: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-27807: no packages for Container bci/openjdk:latest, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-27807: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-27807: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-27807: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-27807: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-27807: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-27807: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-27807: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-27807: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-27807: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-27807: no packages for Container bci/openjdk:latest, but entry? CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-27807: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-27807: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-27807: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-27807: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-27807: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-27807: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-27807: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-27807: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-27807: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-27807: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-27807: no packages for Container bci/openjdk:latest, but entry? CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-27807: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-27807: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-27807: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-27807: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-27807: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-27807: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-27807: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-27807: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-27807: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-27807: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-27803 skipping CVE-2021-27645 as CVE page is older than CVRF-CVE file. skipping CVE-2021-27379 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-27219 skipping CVE-2021-27212 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-27135 No V5 entry found for CVE-2021-27017 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/27xxxx/CVE-2021-27017.json:No such file or directory skipping CVE-2021-26945 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-26937 skipping CVE-2021-26934 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26933 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26927 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26926 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-26813 skipping CVE-2021-26720 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26708 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-26676 skipping CVE-2021-26691 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26690 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-26675 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-26341 skipping CVE-2021-26388 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26378 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26376 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26375 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26373 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26372 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26364 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26350 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26349 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26348 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26347 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26345 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26342 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26339 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26318 as CVE page is older than CVRF-CVE file. skipping CVE-2021-26312 as CVE page is older than CVRF-CVE file. CVE-2021-26291: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-26291: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-26291: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-26291: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-26291: no packages for Container bci/openjdk:latest, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-26291: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-26291: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-26291: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-26291: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-26291: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-26291: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-26291: no packages for Container bci/openjdk:latest, but entry? CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-26291: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-26291: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-26291: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-26291: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-26291: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-26291: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-26291: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-26291: no packages for Container bci/openjdk:latest, but entry? CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-26291: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-26291: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-26291: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-26291: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-26291: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-26291: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-26291: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-26291: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-26291: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-26291: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2021-26260 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-25749 skipping CVE-2021-25786 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-25743 No V5 entry found for CVE-2021-25635 / /home/securitybot/prod/cve-database/cvelistV5/cves/2021/25xxxx/CVE-2021-25635.json:No such file or directory skipping CVE-2021-25314 as CVE page is older than CVRF-CVE file. skipping CVE-2021-25313 as CVE page is older than CVRF-CVE file. skipping CVE-2021-25281 as CVE page is older than CVRF-CVE file. skipping CVE-2021-25220 as CVE page is older than CVRF-CVE file. skipping CVE-2021-25219 as CVE page is older than CVRF-CVE file. skipping CVE-2021-25218 as CVE page is older than CVRF-CVE file. skipping CVE-2021-25217 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-24119 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-24119 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-24115 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-24115 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-23980 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-23926 skipping CVE-2021-23901 as CVE page is older than CVRF-CVE file. skipping CVE-2021-23841 as CVE page is older than CVRF-CVE file. skipping CVE-2021-23840 as CVE page is older than CVRF-CVE file. skipping CVE-2021-23839 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-23556 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-23385 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-23336.xml 2024-10-05 03:18:16.421636000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-23336.xml.new 2024-10-29 02:00:03.018683000 +0100 @@ -14,13 +14,13 @@ 1 - 161 - 2024-10-05T01:18:15Z + 162 + 2024-10-29T01:00:02Z current 2021-05-30T14:48:27Z - 2024-10-05T01:18:15Z + 2024-10-29T01:00:02Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2636,6 +2636,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36-3.6.13-4.36.1 @@ -7655,6 +7673,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -9449,6 +9485,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2021-23222 as CVE page is older than CVRF-CVE file. skipping CVE-2021-23215 as CVE page is older than CVRF-CVE file. skipping CVE-2021-23214 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-23177 skipping CVE-2021-23169 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-23159 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-23159 skipping CVE-2021-22947 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22946 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22945 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-22929 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-22929 skipping CVE-2021-22926 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22925 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22924 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22923 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22922 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22904 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22901 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22898 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22897 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22890 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22885 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22880 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22600 as CVE page is older than CVRF-CVE file. CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-22570: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2021-22570: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-22570: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22570 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22570 CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2021-22570: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-22570: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-22570: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-22570: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-22570: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-22570: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2021-22570: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-22570: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-22570: no packages for SUSE Manager Server 4.2, but entry? no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2021-22569 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2021-22569 skipping CVE-2021-22297 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22222 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22207 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-22204 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-22204 skipping CVE-2021-22191 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22174 as CVE page is older than CVRF-CVE file. skipping CVE-2021-22173 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21900 skipping CVE-2021-21996 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21899 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21898 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21897 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21708 skipping CVE-2021-21806 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21781 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21779 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21775 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21707 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21703 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21416 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21404 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21374 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21374 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-21374 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21373 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21373 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-21373 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21372 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21372 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-21372 skipping CVE-2021-21351 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21350 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21349 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21348 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21347 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21346 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21345 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21344 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21343 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21342 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21341 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21330 skipping CVE-2021-21290 as CVE page is older than CVRF-CVE file. skipping CVE-2021-21272 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-21241 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21240 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-21236 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-21236 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21220 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-21212 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21206 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21199 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21198 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21197 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21196 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21195 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21194 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21193 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21192 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21191 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21190 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21189 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21188 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21187 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21186 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21185 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21184 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21183 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21182 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21181 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21180 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21179 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21178 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21177 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21176 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21175 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21174 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21173 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21172 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21171 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21170 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21169 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21168 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21167 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21166 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21165 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21164 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21163 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21162 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21161 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21160 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21159 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21157 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21156 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21155 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21154 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21153 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21152 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21151 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21150 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21149 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21148 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21147 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21146 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21145 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21144 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21143 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21142 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21141 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21141 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21140 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21140 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21139 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21139 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21138 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21138 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21137 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21137 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21136 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21136 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21135 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21135 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21134 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21134 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21133 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21133 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21132 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21132 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21131 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21131 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21130 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21130 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21129 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21129 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21128 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21128 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21127 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21127 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21126 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21126 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21125 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21125 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21124 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21124 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21123 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21123 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21122 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21122 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21121 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21121 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21120 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21120 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21119 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21119 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21118 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21118 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21117 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21117 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21116 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21116 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21115 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21115 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21114 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21114 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21113 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21113 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21112 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21112 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21111 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21111 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21110 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21110 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21109 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21109 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21108 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21108 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21107 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21107 no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-21106 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-21106 skipping CVE-2021-20320 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20317 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-20314 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20314 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20314 skipping CVE-2021-20315 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20310 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2021-20308 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20308 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20308 skipping CVE-2021-20305 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20297 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20296 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20295 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20294 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20288 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-20285 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20276 skipping CVE-2021-20284 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20277 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20275 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20274 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20273 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20272 skipping CVE-2021-20271 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20269 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20268 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20266 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20265 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20263 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20261 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20255 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-20251 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20247 skipping CVE-2021-20248 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20245 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20241 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20240 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20239 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20232 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20231 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-20228 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20228 skipping CVE-2021-20229 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20227 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20226 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20224 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20221 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20217 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-20216 CVE-2021-20206: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2021-20206: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-20206: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry? CVE-2021-20206: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry? CVE-2021-20206: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry? CVE-2021-20206: no packages for Container bci/nodejs:12-17.28, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry? CVE-2021-20206: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry? CVE-2021-20206: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry? CVE-2021-20206: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry? CVE-2021-20206: no packages for Container rancher/elemental-teal/5.4:latest, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2021-20206: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2021-20206: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2021-20206: no packages for Container caasp/v4/cilium:1.6.6, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2021-20206: no packages for Container bci/python:3.9-20.4, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2021-20206: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry? CVE-2021-20206: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry? CVE-2021-20206: no packages for Container bci/bci-minimal:15.3.32.15, but entry? CVE-2021-20206: no packages for Container suse/sle15:15.3.17.20.57, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-20206: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2021-20206: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry? CVE-2021-20206: no packages for Container bci/bci-init:15.3.21.22, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2021-20206: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-20206 CVE-2021-20206: no packages for Container bci/bci-init:15.3.21.22, but entry? CVE-2021-20206: no packages for Container bci/bci-minimal:15.3.32.15, but entry? CVE-2021-20206: no packages for Container bci/nodejs:12-17.28, but entry? CVE-2021-20206: no packages for Container bci/python:3.9-20.4, but entry? CVE-2021-20206: no packages for Container caasp/v4/cilium:1.6.6, but entry? CVE-2021-20206: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry? CVE-2021-20206: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry? CVE-2021-20206: no packages for Container rancher/elemental-teal/5.4:latest, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry? CVE-2021-20206: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry? CVE-2021-20206: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry? CVE-2021-20206: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2021-20206: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry? CVE-2021-20206: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry? CVE-2021-20206: no packages for Container suse/sle15:15.3.17.20.57, but entry? CVE-2021-20206: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry? CVE-2021-20206: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry? CVE-2021-20206: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry? CVE-2021-20206: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-20206: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2021-20206: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2021-20206: no packages for openSUSE Leap Micro 5.3, but entry? CVE-2021-20206: no packages for Container bci/bci-init:15.3.21.22, but entry? CVE-2021-20206: no packages for Container bci/bci-minimal:15.3.32.15, but entry? CVE-2021-20206: no packages for Container bci/nodejs:12-17.28, but entry? CVE-2021-20206: no packages for Container bci/python:3.9-20.4, but entry? CVE-2021-20206: no packages for Container caasp/v4/cilium:1.6.6, but entry? CVE-2021-20206: no packages for Container rancher/elemental-teal-iso/5.4:latest, but entry? CVE-2021-20206: no packages for Container rancher/elemental-teal-rt/5.4:latest, but entry? CVE-2021-20206: no packages for Container rancher/elemental-teal/5.4:latest, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry? CVE-2021-20206: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry? CVE-2021-20206: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry? CVE-2021-20206: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry? CVE-2021-20206: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry? CVE-2021-20206: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2021-20206: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry? CVE-2021-20206: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry? CVE-2021-20206: no packages for Container suse/sle15:15.3.17.20.57, but entry? CVE-2021-20206: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry? CVE-2021-20206: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry? CVE-2021-20206: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry? CVE-2021-20206: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-20206: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-20206: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Micro 5.3, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2021-20206: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2021-20206: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2021-20206: no packages for openSUSE Leap Micro 5.3, but entry? skipping CVE-2021-20205 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20203 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20201 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-20199 skipping CVE-2021-20197 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20196 as CVE page is older than CVRF-CVE file. skipping CVE-2021-20194 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-20191 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20191 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-20180 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20180 skipping CVE-2021-20181 as CVE page is older than CVRF-CVE file. CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-20178: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2021-20178: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-20178: no packages for Container suse/manager/4.3/proxy-httpd:4.3.1.9.7.1, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2021-20178: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2021-20178: no packages for SUSE Manager Proxy Module 4.1, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2021-20178: no packages for SUSE Manager Server Module 4.1, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-20178 CVE-2021-20178: no packages for Container suse/manager/4.3/proxy-httpd:4.3.1.9.7.1, but entry? CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry? CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2021-20178: no packages for SUSE Manager Proxy Module 4.1, but entry? CVE-2021-20178: no packages for SUSE Manager Server Module 4.1, but entry? CVE-2021-20178: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-20178: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-20178: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2021-20178: no packages for Container suse/manager/4.3/proxy-httpd:4.3.1.9.7.1, but entry? CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/proxy-httpd:5.0.0-beta1.2.94, but entry? CVE-2021-20178: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-20178: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-20178: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-ESPOS, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise High Performance Computing 15-LTSS, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise Server 15-LTSS, but entry? CVE-2021-20178: no packages for SUSE Linux Enterprise Server for SAP Applications 15, but entry? CVE-2021-20178: no packages for SUSE Manager Proxy Module 4.1, but entry? CVE-2021-20178: no packages for SUSE Manager Server Module 4.1, but entry? CVE-2021-20178: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-20178: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-20178: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-4442.xml 2024-10-22 03:48:40.440143000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-4442.xml.new 2024-10-29 02:02:37.776636000 +0100 @@ -14,13 +14,13 @@ 1 - 7 - 2024-10-22T01:48:40Z + 8 + 2024-10-29T01:02:37Z current 2024-08-30T07:55:10Z - 2024-10-22T01:48:40Z + 2024-10-29T01:02:37Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -378,6 +378,253 @@ openSUSE Leap 15.6 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + cluster-md-kmp-default @@ -1555,6 +1802,229 @@ openSUSE Leap 15.6:ocfs2-kmp-default openSUSE Leap 15.6:reiserfs-kmp-default + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + skipping CVE-2021-4441 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-4440.xml 2024-10-22 03:48:41.224092000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-4440.xml.new 2024-10-29 02:02:38.648015000 +0100 @@ -14,13 +14,13 @@ 1 - 8 - 2024-10-22T01:48:40Z + 9 + 2024-10-29T01:02:38Z current 2024-06-29T18:02:54Z - 2024-10-22T01:48:40Z + 2024-10-29T01:02:38Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -102,6 +102,21 @@ Image SLES12-SP5-Azure-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + SUSE Enterprise Storage 7.1 @@ -381,6 +396,253 @@ openSUSE Leap 15.6 + + + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + SLES 15 SP1 CHOST Images for Amazon EC2 suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + + + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP2 CHOST Images for Amazon EC2 suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + + + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + SLES 15 SP3 CHOST Images for Amazon EC2 suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + SLES 15 SP4 CHOST Images for Amazon EC2 suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + + + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Google sles-15-sp1-chost-byos-v20220715-x86-64 + + + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Google sles-15-sp2-chost-byos-v20220718-x86-64 + + + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220411-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220510-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220608-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220708-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220718-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220818-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20220916-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221019-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221118-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20221215-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230313-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20230613-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240807-x86-64 + SLES 15 SP3 CHOST Images for Google sles-15-sp3-chost-byos-v20240912-x86-64 + + + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220718-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220721-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220818-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20220916-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221018-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221118-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20221215-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230111-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230210-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230310-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230410-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230510-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230606-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230704-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230804-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230901-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20230928-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231027-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231127-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20231212-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240312-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240612-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240809-x86-64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Google sles-15-sp4-chost-byos-v20240912-x86-64 + + + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210202 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20210304 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220127 + SLES 15 SP1 CHOST Images for Microsoft Azure suse-sles-15-sp1-chost-byos-v20220715-x86_64 + + + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210202 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210304 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210405 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210506 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210610 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210722 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20210913 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20211025 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220126 + SLES 15 SP2 CHOST Images for Microsoft Azure suse-sles-15-sp2-chost-byos-v20220718-x86_64 + + + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210729 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210827 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20210927 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211004 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211101 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20211202 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220103 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220126 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220222 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220310 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220411-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220510-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220609-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220708-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220718-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220818-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220916-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20220921-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221019-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221119-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20221215-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230313-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20230613-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240807-x86_64 + SLES 15 SP3 CHOST Images for Microsoft Azure suse-sles-15-sp3-chost-byos-v20240912-x86_64 + + + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220718-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220721-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220819-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220916-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20220923-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221018-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221118-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20221215-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230111-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230210-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230310-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230410-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230510-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230606-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230704-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230803-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230901-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20230928-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231027-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231127-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20231212-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240312-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240612-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240809-x86_64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-arm64 + SLES 15 SP4 CHOST Images for Microsoft Azure suse-sles-15-sp4-chost-byos-v20240912-x86_64 + + cluster-md-kmp-default @@ -576,6 +838,39 @@ ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-Azure-SAP-BYOS + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + cluster-md-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + dlm-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + gfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + kernel-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + + ocfs2-kmp-default-4.12.14-122.228.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + cluster-md-kmp-default-4.12.14-122.228.1 as a component of SUSE Linux Enterprise High Availability Extension 12 SP5 @@ -1383,6 +1678,17 @@ Image SLES12-SP5-Azure-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:kernel-default-4.12.14-122.228.1 Image SLES12-SP5-Azure-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-BYOS:ocfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:cluster-md-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:dlm-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:gfs2-kmp-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:kernel-default-4.12.14-122.228.1 + Image SLES12-SP5-GCE-SAP-On-Demand:ocfs2-kmp-default-4.12.14-122.228.1 SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.228.1 SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.228.1 SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.228.1 @@ -1635,6 +1941,229 @@ openSUSE Leap 15.6:ocfs2-kmp-default openSUSE Leap 15.6:reiserfs-kmp-default + + chost:amazon/suse-sles-15-sp1-chost-byos-v20210304-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp1-chost-byos-v20220715-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210610-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210722-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20210913-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20211025-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp2-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210729-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210827-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20210927-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211004-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211101-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20211202-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220103-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220126-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220222-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220411-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220608-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220708-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220818-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20220921-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221019-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221119-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230313-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20230613-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240807-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp3-chost-byos-v20240912-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220718-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220721-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220819-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220916-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20220923-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221018-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221118-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20221215-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230111-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230210-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230310-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230410-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230510-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230606-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230704-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230803-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230901-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20230928-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231027-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231127-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20231212-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240312-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240612-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240809-hvm-ssd-x86_64 + chost:amazon/suse-sles-15-sp4-chost-byos-v20240912-hvm-ssd-x86_64 + chost:google/sles-15-sp1-chost-byos-v20210202 + chost:google/sles-15-sp1-chost-byos-v20210304 + chost:google/sles-15-sp1-chost-byos-v20220127 + chost:google/sles-15-sp1-chost-byos-v20220715-x86-64 + chost:google/sles-15-sp2-chost-byos-v20210202 + chost:google/sles-15-sp2-chost-byos-v20210304 + chost:google/sles-15-sp2-chost-byos-v20210405 + chost:google/sles-15-sp2-chost-byos-v20210506 + chost:google/sles-15-sp2-chost-byos-v20210610 + chost:google/sles-15-sp2-chost-byos-v20210722 + chost:google/sles-15-sp2-chost-byos-v20210913 + chost:google/sles-15-sp2-chost-byos-v20211025 + chost:google/sles-15-sp2-chost-byos-v20220126 + chost:google/sles-15-sp2-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20210729 + chost:google/sles-15-sp3-chost-byos-v20210827 + chost:google/sles-15-sp3-chost-byos-v20210927 + chost:google/sles-15-sp3-chost-byos-v20211004 + chost:google/sles-15-sp3-chost-byos-v20211101 + chost:google/sles-15-sp3-chost-byos-v20211202 + chost:google/sles-15-sp3-chost-byos-v20220103 + chost:google/sles-15-sp3-chost-byos-v20220126 + chost:google/sles-15-sp3-chost-byos-v20220222 + chost:google/sles-15-sp3-chost-byos-v20220310 + chost:google/sles-15-sp3-chost-byos-v20220411-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220510-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220608-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220708-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp3-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221019-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp3-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230313-x86-64 + chost:google/sles-15-sp3-chost-byos-v20230613-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240807-x86-64 + chost:google/sles-15-sp3-chost-byos-v20240912-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220718-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220721-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220818-x86-64 + chost:google/sles-15-sp4-chost-byos-v20220916-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221018-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221118-x86-64 + chost:google/sles-15-sp4-chost-byos-v20221215-arm64 + chost:google/sles-15-sp4-chost-byos-v20221215-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230111-arm64 + chost:google/sles-15-sp4-chost-byos-v20230111-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230210-arm64 + chost:google/sles-15-sp4-chost-byos-v20230210-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230310-arm64 + chost:google/sles-15-sp4-chost-byos-v20230310-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230410-arm64 + chost:google/sles-15-sp4-chost-byos-v20230410-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230510-arm64 + chost:google/sles-15-sp4-chost-byos-v20230510-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230606-arm64 + chost:google/sles-15-sp4-chost-byos-v20230606-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230704-arm64 + chost:google/sles-15-sp4-chost-byos-v20230704-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230804-arm64 + chost:google/sles-15-sp4-chost-byos-v20230804-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230901-arm64 + chost:google/sles-15-sp4-chost-byos-v20230901-x86-64 + chost:google/sles-15-sp4-chost-byos-v20230928-arm64 + chost:google/sles-15-sp4-chost-byos-v20230928-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231027-arm64 + chost:google/sles-15-sp4-chost-byos-v20231027-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231127-arm64 + chost:google/sles-15-sp4-chost-byos-v20231127-x86-64 + chost:google/sles-15-sp4-chost-byos-v20231212-arm64 + chost:google/sles-15-sp4-chost-byos-v20231212-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240312-arm64 + chost:google/sles-15-sp4-chost-byos-v20240312-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240612-arm64 + chost:google/sles-15-sp4-chost-byos-v20240612-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240809-arm64 + chost:google/sles-15-sp4-chost-byos-v20240809-x86-64 + chost:google/sles-15-sp4-chost-byos-v20240912-arm64 + chost:google/sles-15-sp4-chost-byos-v20240912-x86-64 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220127 + chost:microsoft/suse-sles-15-sp1-chost-byos-v20220715-x86_64 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210202 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210304 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210405 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210506 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210610 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210722 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20210913 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20211025 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp2-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210729 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210827 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20210927 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211004 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211101 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20211202 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220103 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220126 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220222 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220310 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220411-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220510-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220609-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220708-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220818-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20220921-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221019-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221119-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230313-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20230613-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240807-x86_64 + chost:microsoft/suse-sles-15-sp3-chost-byos-v20240912-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220718-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220721-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220819-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220916-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20220923-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221018-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221118-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20221215-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230111-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230210-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230310-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230410-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230510-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230606-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230704-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230803-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230901-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20230928-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231027-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231127-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20231212-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240312-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240612-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240809-x86_64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-arm64 + chost:microsoft/suse-sles-15-sp4-chost-byos-v20240912-x86_64 + skipping CVE-2021-4439 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4219 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4218 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4216 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-4216 skipping CVE-2021-4214 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4209 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4207 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4206 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4204 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4193 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4192 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4190 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4187 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4186 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4185 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4184 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4183 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4182 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4181 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4173 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4166 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4160 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4159 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4158 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4157 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4156 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4155 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4154 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4150 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4149 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4148 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4147 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4145 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4136 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4135 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4129 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4128 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4122 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-4104 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4104 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4102 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4101 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4100 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4099 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4098 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-4091 skipping CVE-2021-4095 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4093 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4090 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4079 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4078 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4068 skipping CVE-2021-4069 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4067 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4066 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4065 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4064 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4063 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4062 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4061 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4059 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4058 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4057 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4056 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4055 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4054 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4053 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-4052 skipping CVE-2021-4048 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4044 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-4034 skipping CVE-2021-4037 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-4024 skipping CVE-2021-4032 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4028 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4023 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4019 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4011 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4010 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4009 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4008 as CVE page is older than CVRF-CVE file. skipping CVE-2021-4001 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3999 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3998 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3997 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3996 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3995 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3984 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3982 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3981 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3979 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3975 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3974 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3973 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3968 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3962 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3947 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3941 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3939 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3933 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3930 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3928 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3927 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3918 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-3918 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3903 skipping CVE-2021-3905 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3896 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3892 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3875 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3872 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3864 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3847 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3839 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3828 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3826 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3807 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2021-3807 skipping CVE-2021-3802 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3800 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3798 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3796 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3782 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3778 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3770 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3750 skipping CVE-2021-3748 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3744 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3743 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3739 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3738 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3737 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3736 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3735 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3733 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3714 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3713 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3712 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3711 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3697 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3696 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3695 skipping CVE-2021-3682 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3677 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3670 skipping CVE-2021-3671 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3669 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3658 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-3643 no cpe found for SUSE Package Hub 15 SP5 in CVE-2021-3643 skipping CVE-2021-3648 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3638 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3635 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3634 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3631 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3630 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3623 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-3622 no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3620 skipping CVE-2021-3621 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3618 skipping CVE-2021-3611 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3610 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3608 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3607 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3601 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3600 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3596 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3595 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3594 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3593 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3592 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3588 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3583 no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-3578 skipping CVE-2021-3582 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3580 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3575 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3574 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3573 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2021-3570 skipping CVE-2021-3567 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3564 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-3561 no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-3561 skipping CVE-2021-3559 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3556 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3549 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3547 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3546 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3545 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3544 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3543 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3541 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3531 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3530 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3527 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3521 skipping CVE-2021-3518 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3517 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3516 as CVE page is older than CVRF-CVE file. CVE-2021-3507: no packages for openSUSE Leap 15.3, but entry? CVE-2021-3507: no packages for openSUSE Leap 15.3, but entry? CVE-2021-3507: no packages for openSUSE Leap 15.3, but entry? skipping CVE-2021-3509 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3506 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3502 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3501 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2021-3496 skipping CVE-2021-3498 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3497 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3493 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3492 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3490 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3489 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3487 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3482 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3481 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3478 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3477 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3474 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3467 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3466 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3450 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3449 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2021-3447 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-3445 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2021-3429 skipping CVE-2021-3443 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-3427 no cpe found for SUSE Package Hub 15 SP4 in CVE-2021-3427 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-3426.xml 2024-10-22 03:53:26.669158000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-3426.xml.new 2024-10-29 02:03:42.376801000 +0100 @@ -14,13 +14,13 @@ 1 - 252 - 2024-10-22T01:53:25Z + 253 + 2024-10-29T01:03:41Z current 2021-05-30T14:46:42Z - 2024-10-22T01:53:25Z + 2024-10-29T01:03:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3289,6 +3289,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -7972,6 +7990,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -10458,6 +10494,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2021-3421 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3418 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3411 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3410 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3409 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3408 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3393 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3392 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3345 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3246 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3236 as CVE page is older than CVRF-CVE file. skipping CVE-2021-3200 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2021-3195 skipping CVE-2021-3185 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-3177.xml 2024-10-05 03:24:21.705422000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2021-3177.xml.new 2024-10-29 02:03:52.771635000 +0100 @@ -14,13 +14,13 @@ 1 - 161 - 2024-10-05T01:24:21Z + 162 + 2024-10-29T01:03:52Z current 2021-05-30T14:46:34Z - 2024-10-05T01:24:21Z + 2024-10-29T01:03:52Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2425,6 +2425,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36-3.6.12-4.33.3 @@ -6724,6 +6742,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -8278,6 +8314,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-2471: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-2471: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-2471: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-2471: no packages for Container bci/openjdk:latest, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2021-2471: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-2471: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-2471: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-2471: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2021-2471: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Enterprise Storage 7, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-2471: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-2471: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-2471: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-2471: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-2471: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-2471: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-2471: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-2471: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-2471: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-2471: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-2471: no packages for Container bci/openjdk:latest, but entry? CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-2471: no packages for SUSE Enterprise Storage 7, but entry? CVE-2021-2471: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-2471: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-2471: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-2471: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-2471: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2021-2471: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2021-2471: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2021-2471: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2021-2471: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2021-2471: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2021-2471: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2021-2471: no packages for Container bci/openjdk:latest, but entry? CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2021-2471: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2021-2471: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2021-2471: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2021-2471: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2021-2471: no packages for SUSE Enterprise Storage 7, but entry? CVE-2021-2471: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2021-2471: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2021-2471: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2021-2471: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2021-2471: no packages for SUSE Manager Server 4.2, but entry? CVE-2021-2471: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2021-2471: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2021-2432 as CVE page is older than CVRF-CVE file. skipping CVE-2021-2389 as CVE page is older than CVRF-CVE file. skipping CVE-2021-2388 as CVE page is older than CVRF-CVE file. skipping CVE-2021-2372 as CVE page is older than CVRF-CVE file. skipping CVE-2021-2341 as CVE page is older than CVRF-CVE file. skipping CVE-2021-2161 as CVE page is older than CVRF-CVE file. skipping CVE-2021-1826 as CVE page is older than CVRF-CVE file. skipping CVE-2021-1825 as CVE page is older than CVRF-CVE file. skipping CVE-2021-1820 as CVE page is older than CVRF-CVE file. skipping CVE-2021-1817 as CVE page is older than CVRF-CVE file. skipping CVE-2021-1048 as CVE page is older than CVRF-CVE file. skipping CVE-2021-1043 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0961 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0939 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0938 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0929 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0924 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0707 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0606 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0561 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0183 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0176 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0175 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0174 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0173 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0172 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0170 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0168 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0166 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0165 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0164 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0161 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0076 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0072 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0071 as CVE page is older than CVRF-CVE file. skipping CVE-2021-0066 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36788 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36787 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36786 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36785 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36784 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36783 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36782 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36781 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36780 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36779 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36778 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36777 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36776 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36775 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36773 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36694 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-36619 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-36619 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-36558 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-36516 skipping CVE-2020-36518 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-36428 skipping CVE-2020-36430 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36403 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-36403 skipping CVE-2020-36394 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36387 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36332 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36331 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36330 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36329 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36328 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36314 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36313 as CVE page is older than CVRF-CVE file. CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-36242: no packages for Container suse/sle15:15.1.6.2.811, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-36242 CVE-2020-36242: no packages for Container suse/sle15:15.1.6.2.811, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2020-36242: no packages for Container suse/sle15:15.1.6.2.811, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-36242: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2020-36242: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? skipping CVE-2020-36230 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36229 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36228 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36227 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36226 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36225 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36224 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36223 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36222 as CVE page is older than CVRF-CVE file. skipping CVE-2020-36221 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-36193 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36152 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36151 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36150 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36149 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-36148 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-36024 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-36023 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-35730 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-35730 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-35730 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-35730 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-35701 skipping CVE-2020-35702 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-35678 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-35678 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-35573 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-35573 skipping CVE-2020-35538 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35537 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35536 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35527 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35525 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35524 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35523 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35522 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35521 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35517 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35513 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-35511 skipping CVE-2020-35508 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35507 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35506 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35505 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35504 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35503 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35501 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-35471 skipping CVE-2020-35499 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35498 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35496 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35495 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35494 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35493 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35492 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35459 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35458 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35452 as CVE page is older than CVRF-CVE file. skipping CVE-2020-35448 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-35357 skipping CVE-2020-35342 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-29663 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-29663 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-29663 CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-29651 CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2020-29651: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? skipping CVE-2020-29567 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29534 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2020-29488 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/29xxxx/CVE-2020-29488.json:No such file or directory no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-29488 skipping CVE-2020-29487 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29486 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29485 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29482 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29479 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29443 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29385 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29373 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29372 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29370 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29369 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-29367 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-29367 skipping CVE-2020-29363 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29362 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29361 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29260 as CVE page is older than CVRF-CVE file. skipping CVE-2020-29129 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-28949 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-28948 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28935 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28935 skipping CVE-2020-28941 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28926 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28926 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28924 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28924 skipping CVE-2020-28916 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28896 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28896 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28600 no cpe found for SUSE Linux Enterprise Server 11-PUBCLOUD in CVE-2020-28493 skipping CVE-2020-28588 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-28491 skipping CVE-2020-28477 as CVE page is older than CVRF-CVE file. skipping CVE-2020-28243 as CVE page is older than CVRF-CVE file. skipping CVE-2020-28200 as CVE page is older than CVRF-CVE file. CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-28052: no packages for Container bci/openjdk:latest, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-28052: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-28052: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-28052: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-28052: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-28052: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-28052: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-28052: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-28052: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-28052: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-28052: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-28052: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-28052: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-28052: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-28052: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-28052: no packages for Container bci/openjdk:latest, but entry? CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-28052: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-28052: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-28052: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-28052: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-28052: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-28052: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-28052: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-28052: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-28052: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-28052: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-28052: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-28052: no packages for Container bci/openjdk:latest, but entry? CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-28052: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-28052: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-28052: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-28052: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-28052: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-28052: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-28052: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-28052: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-28052: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-28052: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28049 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28049 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28026 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28026 skipping CVE-2020-28030 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28025 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28025 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28024 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28024 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28023 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28023 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28022 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28022 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28021 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28021 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28020 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28020 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28019 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28019 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28018 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28018 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28017 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28017 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28016 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28016 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28015 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28015 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28014 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28014 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28013 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28013 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28012 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28012 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28011 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28011 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28010 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28010 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28009 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28009 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28008 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28008 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-28007 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-28007 skipping CVE-2020-27845 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27844 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27843 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27842 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27841 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27840 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27839 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27837 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27834 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27830 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27829 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27824 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27823 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-27819 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-27818 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-27818 skipping CVE-2020-27814 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27792 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27784 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27781 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27780 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27778 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27758 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27756 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27661 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27619 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27616 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-27347 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-27347 skipping CVE-2020-27418 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-27208 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-27208 skipping CVE-2020-27194 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27153 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27152 as CVE page is older than CVRF-CVE file. skipping CVE-2020-27067 as CVE page is older than CVRF-CVE file. CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-26945: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-26945: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-26945: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-26945: no packages for openSUSE Leap 15.4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-26945: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-26945: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-26945: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-26945: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-26945: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-26945: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-26945: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-26945: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-26945: no packages for Container bci/openjdk:latest, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-26945: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-26945: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-26945: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-26945: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-26945: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-26945: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-26945: no packages for Container bci/openjdk:latest, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-26945: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-26945: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-26945: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-26945: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-26945: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-26945: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-26945: no packages for openSUSE Leap 15.4, but entry? CVE-2020-26945: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-26945: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-26945: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-26945: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-26945: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-26945: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-26945: no packages for Container bci/openjdk:latest, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-26945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-26945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-26945: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-26945: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-26945: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-26945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-26945: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-26945: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-26945: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-26945: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-26945: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-26945: no packages for openSUSE Leap 15.4, but entry? no cpe found for SUSE Package Hub 15 in CVE-2020-26935 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26935 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-26935 no cpe found for SUSE Package Hub 15 in CVE-2020-26934 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26934 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-26934 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26664 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-26664 skipping CVE-2020-26682 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26575 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26560 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26559 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26557 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26556 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26555 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26422 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26421 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26420 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26419 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26418 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26271 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26270 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26268 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26267 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-26266 skipping CVE-2020-26259 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26258 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26247 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26215 skipping CVE-2020-26217 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-26164 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-26164 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-26159 skipping CVE-2020-26147 as CVE page is older than CVRF-CVE file. skipping CVE-2020-26141 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-25829 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25829 skipping CVE-2020-25866 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25863 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25862 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25743 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25741 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25725 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25723 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25722 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25720 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25719 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25718 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25713 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-25710 skipping CVE-2020-25709 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25707 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25705 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25697 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25696 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25692 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25678 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25677 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25667 as CVE page is older than CVRF-CVE file. CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-Azure-BYOS, but entry? CVE-2020-25659: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry? CVE-2020-25659: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.282, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-25659: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry? CVE-2020-25659: no packages for Container caasp/v4/389-ds:1.4.2, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-25659: no packages for Image SLES15-EC2-HVM-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Micro 5.0, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-Azure, but entry? CVE-2020-25659: no packages for Container suse/sle15:15.1.6.2.811, but entry? CVE-2020-25659: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-SP2-GCE, but entry? CVE-2020-25659: no packages for Image SLES15-Azure-BYOS, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-25659 CVE-2020-25659: no packages for Container caasp/v4/389-ds:1.4.2, but entry? CVE-2020-25659: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.282, but entry? CVE-2020-25659: no packages for Container suse/sle15:15.1.6.2.811, but entry? CVE-2020-25659: no packages for Image SLES15-Azure-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-EC2-HVM-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-Azure, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-Azure-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry? CVE-2020-25659: no packages for Image SLES15-SP2-GCE, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Micro 5.0, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2020-25659: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-25659: no packages for Container caasp/v4/389-ds:1.4.2, but entry? CVE-2020-25659: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.282, but entry? CVE-2020-25659: no packages for Container suse/sle15:15.1.6.2.811, but entry? CVE-2020-25659: no packages for Image SLES15-Azure-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-EC2-HVM-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-Azure, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-Azure-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM, but entry? CVE-2020-25659: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry? CVE-2020-25659: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry? CVE-2020-25659: no packages for Image SLES15-SP2-GCE, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Micro 5.0, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2020-25659: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2020-25659: no packages for SUSE Package Hub 15 SP2, but entry? skipping CVE-2020-25663 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25662 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25661 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25660 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-25658 skipping CVE-2020-25657 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25654 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25649 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25638 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25626 skipping CVE-2020-25275 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25221 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25220 as CVE page is older than CVRF-CVE file. skipping CVE-2020-25125 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25074 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25040 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25039 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-25032 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-25032 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-25032 skipping CVE-2020-24994 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24980 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24979 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-24972 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24698 skipping CVE-2020-24742 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24741 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24736 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24697 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24696 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-24654 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-24654 skipping CVE-2020-24659 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-24614 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-24614 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-24588 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24584 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-24583 skipping CVE-2020-24504 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24503 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24502 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24490 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24455 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-24368 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-24368 skipping CVE-2020-24371 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24370 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24369 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24352 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24342 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-24119 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-24119 skipping CVE-2020-24240 as CVE page is older than CVRF-CVE file. skipping CVE-2020-24165 as CVE page is older than CVRF-CVE file. skipping CVE-2020-23922 as CVE page is older than CVRF-CVE file. skipping CVE-2020-23904 as CVE page is older than CVRF-CVE file. skipping CVE-2020-23903 as CVE page is older than CVRF-CVE file. skipping CVE-2020-23804 as CVE page is older than CVRF-CVE file. skipping CVE-2020-23793 as CVE page is older than CVRF-CVE file. skipping CVE-2020-22935 as CVE page is older than CVRF-CVE file. skipping CVE-2020-22916 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-22628 skipping CVE-2020-22219 as CVE page is older than CVRF-CVE file. skipping CVE-2020-22218 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-22027 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-22021 skipping CVE-2020-21913 as CVE page is older than CVRF-CVE file. skipping CVE-2020-21710 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21683 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21683 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21682 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21682 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21681 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21681 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21680 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21680 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21534 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21534 skipping CVE-2020-21674 as CVE page is older than CVRF-CVE file. skipping CVE-2020-21583 as CVE page is older than CVRF-CVE file. skipping CVE-2020-21535 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21533 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21533 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21532 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21532 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21531 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21531 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21530 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21530 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-21529 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-21529 skipping CVE-2020-21490 as CVE page is older than CVRF-CVE file. skipping CVE-2020-21047 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-20901 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-20900 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-20898 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-20894 skipping CVE-2020-20412 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19909 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19726 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19724 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19716 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19715 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-19609 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-19609 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-19609 skipping CVE-2020-19190 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19189 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19188 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19187 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19186 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19185 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19144 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19143 as CVE page is older than CVRF-CVE file. skipping CVE-2020-19131 as CVE page is older than CVRF-CVE file. skipping CVE-2020-18899 as CVE page is older than CVRF-CVE file. skipping CVE-2020-18898 as CVE page is older than CVRF-CVE file. skipping CVE-2020-18831 as CVE page is older than CVRF-CVE file. skipping CVE-2020-18781 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-18770 skipping CVE-2020-18774 as CVE page is older than CVRF-CVE file. skipping CVE-2020-18773 as CVE page is older than CVRF-CVE file. skipping CVE-2020-18771 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-18671 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-18671 skipping CVE-2020-18768 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-18670 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-18670 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-18442 skipping CVE-2020-18652 as CVE page is older than CVRF-CVE file. skipping CVE-2020-18651 as CVE page is older than CVRF-CVE file. skipping CVE-2020-17541 as CVE page is older than CVRF-CVE file. skipping CVE-2020-17538 as CVE page is older than CVRF-CVE file. skipping CVE-2020-17507 as CVE page is older than CVRF-CVE file. skipping CVE-2020-17498 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-17482 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-17482 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-17482 skipping CVE-2020-17489 as CVE page is older than CVRF-CVE file. CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-17438: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-17437: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? notsure where SUSE Linux Enterprise Enterprise Server 11 SP1 for SAP Enterprise Search is contained? notsure where SLES for SAP Applications 11 SP2 is contained? notsure where SUSE Studio Extension for System z 1.2 is contained? notsure where SLES for SAP Applications 11 SP3 is contained? no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-17354 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-17353 skipping CVE-2020-17049 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16600 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16600 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-16600 skipping CVE-2020-16599 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16598 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16593 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16592 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16591 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16590 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16310 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16309 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16308 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16307 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16306 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16305 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16304 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16303 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16302 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16301 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16300 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16299 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16298 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16297 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16296 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16295 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16294 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16293 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16292 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16291 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16290 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16289 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16288 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16287 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-16154 skipping CVE-2020-16156 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16155 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16145 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16145 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-16145 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-16145 skipping CVE-2020-16135 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16127 as CVE page is older than CVRF-CVE file. skipping CVE-2020-16126 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16118 skipping CVE-2020-16119 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16116 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16116 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16044 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16044 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16043 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16043 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16042 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16042 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16041 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16041 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16040 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16040 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16039 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16039 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16038 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16038 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16037 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16037 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16036 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16036 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16035 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16035 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16034 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16034 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16033 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16033 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16032 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16032 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16031 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16031 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16030 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16030 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16029 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16029 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16028 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16028 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16027 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16027 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16026 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16026 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16025 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16025 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16024 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16024 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16023 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16023 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16022 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16022 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16021 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16021 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16020 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16020 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16019 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16019 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16018 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16018 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16017 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16017 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16016 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16016 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16015 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16015 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16014 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16014 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16013 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16013 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16012 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16012 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16011 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16011 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16009 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16009 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16008 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16008 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16007 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16007 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16006 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16006 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16005 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16005 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16004 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16004 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16003 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16003 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16002 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16002 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16001 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16001 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-16000 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-16000 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15995 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15995 skipping CVE-2020-15999 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15992 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15992 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15991 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15991 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15990 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15990 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15989 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15989 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15988 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15988 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15987 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15987 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15986 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15986 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15985 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15985 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15984 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15984 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15983 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15983 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15982 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15982 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15981 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15981 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15980 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15980 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15979 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15979 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15978 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15978 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15977 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15977 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15976 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15976 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15975 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15975 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15974 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15974 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15973 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15973 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15972 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15972 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15971 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15971 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15970 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15970 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15969 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15969 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15968 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15968 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15967 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15967 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15966 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15966 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15965 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15965 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15964 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15964 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15963 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15963 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15962 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15962 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15961 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15961 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15960 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15960 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15959 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15959 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15953 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15917 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15917 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15917 skipping CVE-2020-15945 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15889 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15888 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15862 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15861 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15859 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15852 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15803 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15803 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15803 notsure where Magnum Orchestration 7 is contained? skipping CVE-2020-15802 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-15801.xml 2024-10-22 04:08:13.272245000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-15801.xml.new 2024-10-29 02:10:29.108895000 +0100 @@ -14,13 +14,13 @@ 1 - 97 - 2024-10-22T02:08:12Z + 98 + 2024-10-29T01:10:28Z current 2021-05-30T14:42:22Z - 2024-10-22T02:08:12Z + 2024-10-29T01:10:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -968,6 +968,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -1217,6 +1235,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python39-3.9.7-2.1 as a component of openSUSE Tumbleweed @@ -2323,6 +2359,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python39-3.9.7-2.1 openSUSE Tumbleweed:python39-32bit-3.9.7-2.1 openSUSE Tumbleweed:python39-curses-3.9.7-2.1 skipping CVE-2020-15780 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15719 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15694 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15694 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15693 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15693 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15692 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15692 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-15690 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15690 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-15598 no cpe found for SUSE Package Hub 15 SP5 in CVE-2020-15598 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15572 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15572 skipping CVE-2020-15564 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15562 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15562 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-15523.xml 2024-10-22 04:08:42.579237000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-15523.xml.new 2024-10-29 02:10:49.323839000 +0100 @@ -14,13 +14,13 @@ 1 - 97 - 2024-10-22T02:08:42Z + 98 + 2024-10-29T01:10:48Z current 2021-05-30T14:42:05Z - 2024-10-22T02:08:42Z + 2024-10-29T01:10:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -968,6 +968,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -1217,6 +1235,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python39-3.9.7-2.1 as a component of openSUSE Tumbleweed @@ -2323,6 +2359,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python39-3.9.7-2.1 openSUSE Tumbleweed:python39-32bit-3.9.7-2.1 openSUSE Tumbleweed:python39-curses-3.9.7-2.1 CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-15522: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-15522: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-15522: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-15522: no packages for Container bci/openjdk:latest, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-15522: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-15522: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-15522: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-15522: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-15522: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-15522: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-15522: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-15522: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-15522: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-15522: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-15522: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-15522: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-15522: no packages for Container bci/openjdk:latest, but entry? CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-15522: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-15522: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-15522: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-15522: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-15522: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-15522: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-15522: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-15522: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-15522: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-15522: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-15522: no packages for Container bci/openjdk:latest, but entry? CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-15522: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-15522: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-15522: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-15522: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-15522: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-15522: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-15522: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-15522: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-15522: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-15522: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2020-15466 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15397 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15397 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-15396 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15396 skipping CVE-2020-15393 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15389 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15365 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15275 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15238 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15229 skipping CVE-2020-15180 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15169 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15168 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15078 as CVE page is older than CVRF-CVE file. skipping CVE-2020-15075 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-15011 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14983 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14954 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14954 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14929 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14929 skipping CVE-2020-14871 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14664 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14621 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14593 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14583 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14581 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14579 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14578 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14577 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14573 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14562 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14556 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14424 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-14424 skipping CVE-2020-14422 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14416 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14415 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14405 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14396 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14386 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14385 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14382 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14373 as CVE page is older than CVRF-CVE file. CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry? CVE-2020-14367: no packages for Container bci/nodejs:12-13.21, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/grafana:7.5.12.3.734, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Installer Updates 15 SP3, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Aliyun, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.3.17.11.6, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.1.6.2.587, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-node-driver-registrar:v2.3.0-rev1-build3.508, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-Azure-HPC-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-provisioner:v3.0.0-rev1-build3.497, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-livenessprobe:v1.1.0-rev1-build3.517, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-14367: no packages for Container ses/7/rook/ceph:1.7.7.0.1.2016, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-GCE, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-attacher:v3.3.0-rev1-build3.527, but entry? CVE-2020-14367: no packages for Image SLES15-SAP-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2020-14367: no packages for Container bci/golang:latest, but entry? CVE-2020-14367: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2020-14367: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-node-exporter:1.1.2.1.6.6, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-snapshotter:v4.2.0-rev1-build3.490, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-14367: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.74, but entry? CVE-2020-14367: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.455, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-BYOS, but entry? CVE-2020-14367: no packages for Container caasp/v4/cilium:1.6.6, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/grafana:7.5.12.2.2.13, but entry? CVE-2020-14367: no packages for Container caasp/v4/cilium-operator:1.6.6, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/haproxy:2.0.14.2.2.10, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.2.9.5.105, but entry? CVE-2020-14367: no packages for Container ses/6/rook/ceph:1.1.1.0.1.5.568, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/keepalived:2.0.19.2.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.21.0.3.2.10, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry? CVE-2020-14367: no packages for Container bci/nodejs:14-16.21, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-14367: no packages for Container bci/ruby:2.5-14.18, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/cephcsi:3.4.0.0.3.838, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-Azure, but entry? CVE-2020-14367: no packages for Container bci/python:3, but entry? CVE-2020-14367: no packages for Image SLES15-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-EC2, but entry? CVE-2020-14367: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.254, but entry? CVE-2020-14367: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry? CVE-2020-14367: no packages for Container bci/openjdk:11-14.24, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry? CVE-2020-14367: no packages for Container ses/6/cephcsi/cephcsi:1.2.0.0.1.5.583, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.10, but entry? CVE-2020-14367: no packages for Container bci/nodejs:16-4.21, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.3, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Real Time 15 SP2, but entry? CVE-2020-14367: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-resizer:v1.3.0-rev1-build3.493, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-EC2, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-server:2.32.1.1.6.6, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-alertmanager:0.21.0.1.8.1, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-GCE, but entry? CVE-2020-14367: no packages for Container bci/openjdk-devel:11, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.1.2.3.2.10, but entry? CVE-2020-14367: no packages for Container bci/bci-init:15.3, but entry? CVE-2020-14367: no packages for Image SLES15-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-14367: no packages for Container bci/golang:1.17, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.0.4.22.529, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-14367: no packages for Container bci/golang:1.16-12.20, but entry? CVE-2020-14367: no packages for Container bci/bci-init:15.3, but entry? CVE-2020-14367: no packages for Container bci/golang:1.16-12.20, but entry? CVE-2020-14367: no packages for Container bci/golang:1.17, but entry? CVE-2020-14367: no packages for Container bci/golang:latest, but entry? CVE-2020-14367: no packages for Container bci/nodejs:12-13.21, but entry? CVE-2020-14367: no packages for Container bci/nodejs:14-16.21, but entry? CVE-2020-14367: no packages for Container bci/nodejs:16-4.21, but entry? CVE-2020-14367: no packages for Container bci/openjdk-devel:11, but entry? CVE-2020-14367: no packages for Container bci/openjdk:11-14.24, but entry? CVE-2020-14367: no packages for Container bci/python:3, but entry? CVE-2020-14367: no packages for Container bci/ruby:2.5-14.18, but entry? CVE-2020-14367: no packages for Container caasp/v4/cilium-operator:1.6.6, but entry? CVE-2020-14367: no packages for Container caasp/v4/cilium:1.6.6, but entry? CVE-2020-14367: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry? CVE-2020-14367: no packages for Container ses/6/cephcsi/cephcsi:1.2.0.0.1.5.583, but entry? CVE-2020-14367: no packages for Container ses/6/rook/ceph:1.1.1.0.1.5.568, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/grafana:7.5.12.2.2.13, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/haproxy:2.0.14.2.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/keepalived:2.0.19.2.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.21.0.3.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.1.2.3.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.3, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry? CVE-2020-14367: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/grafana:7.5.12.3.734, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-alertmanager:0.21.0.1.8.1, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-node-exporter:1.1.2.1.6.6, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-server:2.32.1.1.6.6, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/cephcsi:3.4.0.0.3.838, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-attacher:v3.3.0-rev1-build3.527, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-livenessprobe:v1.1.0-rev1-build3.517, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-node-driver-registrar:v2.3.0-rev1-build3.508, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-provisioner:v3.0.0-rev1-build3.497, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-resizer:v1.3.0-rev1-build3.493, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-snapshotter:v4.2.0-rev1-build3.490, but entry? CVE-2020-14367: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.455, but entry? CVE-2020-14367: no packages for Container ses/7/rook/ceph:1.7.7.0.1.2016, but entry? CVE-2020-14367: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry? CVE-2020-14367: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2020-14367: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.254, but entry? CVE-2020-14367: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.74, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.0.4.22.529, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.1.6.2.587, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.2.9.5.105, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.3.17.11.6, but entry? CVE-2020-14367: no packages for Image SLES15-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SAP-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-Azure-HPC-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-EC2, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Aliyun, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-EC2, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Installer Updates 15 SP3, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.0, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Real Time 15 SP2, but entry? CVE-2020-14367: no packages for Container bci/bci-init:15.3, but entry? CVE-2020-14367: no packages for Container bci/golang:1.16-12.20, but entry? CVE-2020-14367: no packages for Container bci/golang:1.17, but entry? CVE-2020-14367: no packages for Container bci/golang:latest, but entry? CVE-2020-14367: no packages for Container bci/nodejs:12-13.21, but entry? CVE-2020-14367: no packages for Container bci/nodejs:14-16.21, but entry? CVE-2020-14367: no packages for Container bci/nodejs:16-4.21, but entry? CVE-2020-14367: no packages for Container bci/openjdk-devel:11, but entry? CVE-2020-14367: no packages for Container bci/openjdk:11-14.24, but entry? CVE-2020-14367: no packages for Container bci/python:3, but entry? CVE-2020-14367: no packages for Container bci/ruby:2.5-14.18, but entry? CVE-2020-14367: no packages for Container caasp/v4/cilium-operator:1.6.6, but entry? CVE-2020-14367: no packages for Container caasp/v4/cilium:1.6.6, but entry? CVE-2020-14367: no packages for Container caasp/v4/helm-tiller:2.16.12, but entry? CVE-2020-14367: no packages for Container ses/6/cephcsi/cephcsi:1.2.0.0.1.5.583, but entry? CVE-2020-14367: no packages for Container ses/6/rook/ceph:1.1.1.0.1.5.568, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/grafana:7.5.12.2.2.13, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/haproxy:2.0.14.2.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/keepalived:2.0.19.2.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.21.0.3.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.1.2.3.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.3, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry? CVE-2020-14367: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry? CVE-2020-14367: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/grafana:7.5.12.3.734, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-alertmanager:0.21.0.1.8.1, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-node-exporter:1.1.2.1.6.6, but entry? CVE-2020-14367: no packages for Container ses/7/ceph/prometheus-server:2.32.1.1.6.6, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/cephcsi:3.4.0.0.3.838, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-attacher:v3.3.0-rev1-build3.527, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-livenessprobe:v1.1.0-rev1-build3.517, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-node-driver-registrar:v2.3.0-rev1-build3.508, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-provisioner:v3.0.0-rev1-build3.497, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-resizer:v1.3.0-rev1-build3.493, but entry? CVE-2020-14367: no packages for Container ses/7/cephcsi/csi-snapshotter:v4.2.0-rev1-build3.490, but entry? CVE-2020-14367: no packages for Container ses/7/prometheus-webhook-snmp:1.4.1.455, but entry? CVE-2020-14367: no packages for Container ses/7/rook/ceph:1.7.7.0.1.2016, but entry? CVE-2020-14367: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry? CVE-2020-14367: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2020-14367: no packages for Container suse/sle-micro/5.1/toolbox:11.1-2.2.254, but entry? CVE-2020-14367: no packages for Container suse/sle-micro/5.2/toolbox:11.1-6.2.74, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.0.4.22.529, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.1.6.2.587, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.2.9.5.105, but entry? CVE-2020-14367: no packages for Container suse/sle15:15.3.17.11.6, but entry? CVE-2020-14367: no packages for Image SLES15-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SAP-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-Azure-HPC-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-EC2, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-BYOS, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Aliyun, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-EC2, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-CHOST-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-HPC-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-14367: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Installer Updates 15 SP3, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.0, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Real Time 15 SP2, but entry? CVE-2020-14367: no packages for SUSE Linux Enterprise Installer Updates 15 SP3, but entry? CVE-2020-14365: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2020-14365: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-14365: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14365 CVE-2020-14365: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-14365: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2020-14365: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2020-14365: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-14365: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2020-14365: no packages for SUSE Manager Tools for SLE Micro 5, but entry? no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-14355 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14352 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-14352 skipping CVE-2020-14353 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14350 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14349 as CVE page is older than CVRF-CVE file. CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Standard, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Basic, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-14343: no packages for Image SLES15-Azure-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP2-GCE, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-Azure-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2020-14343: no packages for Container caasp/v4/389-ds:1.4.2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-14343: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-EC2-HVM-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-EC2, but entry? notsure where Public Cloud Module for SUSE Linux Enterprise 11 is contained? no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14343 CVE-2020-14343: no packages for Container caasp/v4/389-ds:1.4.2, but entry? CVE-2020-14343: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry? CVE-2020-14343: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry? CVE-2020-14343: no packages for Image SLES15-Azure-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-EC2-HVM-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-Azure-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry? CVE-2020-14343: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry? CVE-2020-14343: no packages for Image SLES15-SP2-GCE, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Basic, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Standard, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2020-14343: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-14343: no packages for Container caasp/v4/389-ds:1.4.2, but entry? CVE-2020-14343: no packages for Container ses/7.1/cephcsi/cephcsi:3.5.1.0.3.2.10, but entry? CVE-2020-14343: no packages for Container ses/7.1/rook/ceph:1.8.6.0.3.2.5, but entry? CVE-2020-14343: no packages for Image SLES15-Azure-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-EC2-CHOST-HVM-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-EC2-HVM-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-Azure-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SAP-EC2-HVM-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP1-CHOST-BYOS-GCE, but entry? CVE-2020-14343: no packages for Image SLES15-SP1-SAPCAL-GCE, but entry? CVE-2020-14343: no packages for Image SLES15-SP2-GCE, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAP-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Basic, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Azure-Standard, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-HPC-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAP-Hardened-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Basic, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Azure-Standard, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-GDC, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-HPC-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAP-Hardened-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Basic, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Azure-Standard, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Aliyun, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-GDC, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-EC2-ECS-HVM, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-HPC-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-BYOS-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAP-Hardened-EC2, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-14343: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP3, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP4, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP5, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP6, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP3, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP1, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP2, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP3, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP4, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2020-14343: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2020-14343: no packages for SUSE Package Hub 15 SP2, but entry? no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-14332 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-14332 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14330 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-14330 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-14330 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14312 skipping CVE-2020-14305 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14301 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14295 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14196 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14196 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14154 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14154 skipping CVE-2020-14152 as CVE page is older than CVRF-CVE file. skipping CVE-2020-14150 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14147 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14093 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14093 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-14019 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-14019 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-14004 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-14004 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-14004 skipping CVE-2020-14001 as CVE page is older than CVRF-CVE file. CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-13988: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP2, but entry? CVE-2020-13987: no packages for SUSE Linux Enterprise Module for Legacy 15 SP3, but entry? No V5 entry found for CVE-2020-13982 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/13xxxx/CVE-2020-13982.json:No such file or directory No V5 entry found for CVE-2020-13981 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/13xxxx/CVE-2020-13981.json:No such file or directory no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13977 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13977 CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-13956: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-13956: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-13956: no packages for openSUSE Leap 15.4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-13956: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-13956: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-13956: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-13956: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-13956: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-13956: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-13956: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-13956: no packages for Container bci/openjdk:latest, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-13956: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-13956: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-13956: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for SUSE Liberty Linux 8, but entry? CVE-2020-13956: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-13956: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-13956: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-13956: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-13956: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-13956: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-13956: no packages for Container bci/openjdk:latest, but entry? CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-13956: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-13956: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-13956: no packages for SUSE Liberty Linux 8, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-13956: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-13956: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-13956: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-13956: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-13956: no packages for openSUSE Leap 15.4, but entry? CVE-2020-13956: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-13956: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-13956: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-13956: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-13956: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-13956: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-13956: no packages for Container bci/openjdk:latest, but entry? CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-13956: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-13956: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-13956: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-13956: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-13956: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-13956: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-13956: no packages for SUSE Liberty Linux 8, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-13956: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-13956: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-13956: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-13956: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-13956: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-13956: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-13956: no packages for openSUSE Leap 15.4, but entry? skipping CVE-2020-13962 as CVE page is older than CVRF-CVE file. skipping CVE-2020-13950 as CVE page is older than CVRF-CVE file. skipping CVE-2020-13936 as CVE page is older than CVRF-CVE file. skipping CVE-2020-13902 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-13867 skipping CVE-2020-13871 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13848 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13847 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13846 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13845 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-13817 skipping CVE-2020-13844 as CVE page is older than CVRF-CVE file. skipping CVE-2020-13800 as CVE page is older than CVRF-CVE file. skipping CVE-2020-13791 as CVE page is older than CVRF-CVE file. skipping CVE-2020-13777 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-13757 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13696 CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry? CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry? CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry? CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry? CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry? CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry? no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-13692 CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry? CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry? CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry? CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry? CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry? CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry? CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry? CVE-2020-13692: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry? CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure, but entry? CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-13692: no packages for Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE, but entry? skipping CVE-2020-13645 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13625 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13614 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-13596 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13576 skipping CVE-2020-13529 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-13430 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-13430 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13428 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13428 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-13379 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-13379 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-13379 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-13254 No V5 entry found for CVE-2020-13233 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/13xxxx/CVE-2020-13233.json:No such file or directory skipping CVE-2020-13249 as CVE page is older than CVRF-CVE file. skipping CVE-2020-13164 as CVE page is older than CVRF-CVE file. skipping CVE-2020-13143 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12965 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12912 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12888 as CVE page is older than CVRF-CVE file. CVE-2020-12823: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-12823: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-12823: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-12823: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? skipping CVE-2020-12826 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12825 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12783 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12783 skipping CVE-2020-12771 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12769 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12768 as CVE page is older than CVRF-CVE file. notsure where SUSE Linux Enterprise Software Bootstrap Kit 12 is contained? skipping CVE-2020-12762 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-12723 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12695 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12695 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12692 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12691 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12690 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12689 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12672 skipping CVE-2020-12659 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12641 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12641 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-12641 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-12641 skipping CVE-2020-12657 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12656 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12655 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12654 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12653 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12652 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12640 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12640 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12625 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12625 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-12605 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-12604 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-12603 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12459 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-12459 skipping CVE-2020-12465 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12464 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12458 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-12458 skipping CVE-2020-12413 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12399 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12373 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12364 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12363 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12362 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12319 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12317 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12313 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-12245 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12245 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12245 skipping CVE-2020-12267 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12244 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12137 skipping CVE-2020-12243 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12108 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-12108 skipping CVE-2020-12114 as CVE page is older than CVRF-CVE file. CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-12105: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-12105: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-12105: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-12105: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12066 skipping CVE-2020-12100 as CVE page is older than CVRF-CVE file. skipping CVE-2020-12063 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-12052 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-12050 skipping CVE-2020-12049 as CVE page is older than CVRF-CVE file. CVE-2020-11988: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11988: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-11988: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11988: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11988: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11988: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11988: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11988: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11988: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11988: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11988: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11988: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11988: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11988: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11988: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11988: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11988: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11988: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11988: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11988: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11988: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11988: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11988: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11988: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11988: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11988: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11988: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11988: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11988: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11988: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11988: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11988: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11988: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11988: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11988: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Software Development Kit 12 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11988: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11988: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11988: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11988: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11988: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11988: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2020-11993 as CVE page is older than CVRF-CVE file. CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11987: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11987: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11987: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11987: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11987: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11987: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11987: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11987: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11987: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11987: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11987: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11987: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11987: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11987: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11987: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11987: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11987: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11987: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11987: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11987: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11987: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11987: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11987: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11987: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11987: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11987: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11987: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11987: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11987: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11987: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11987: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11987: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11987: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11987: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11987: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11987: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11987: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11987: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11987: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11987: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11979: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11979: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11979: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11979: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11979: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11979: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11979: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11979: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11979: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11979: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11979: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11979: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11979: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11979: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11979: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11979: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11979: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11979: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11979: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11979: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11979: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11979: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11979: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11979: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11979: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11979: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11979: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11979: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11979: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11979: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11979: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11979: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11979: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11979: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11979: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11979: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11979: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11979: no packages for SUSE Manager Server 4.2, but entry? skipping CVE-2020-11984 as CVE page is older than CVRF-CVE file. skipping CVE-2020-11947 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2020-11936 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/11xxxx/CVE-2020-11936.json:No such file or directory skipping CVE-2020-11935 as CVE page is older than CVRF-CVE file. skipping CVE-2020-11931 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-11888 skipping CVE-2020-11884 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-11868 skipping CVE-2020-11869 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-11867 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-11867 skipping CVE-2020-11810 as CVE page is older than CVRF-CVE file. skipping CVE-2020-11800 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-11764 skipping CVE-2020-11765 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-11763 skipping CVE-2020-11762 as CVE page is older than CVRF-CVE file. skipping CVE-2020-11761 as CVE page is older than CVRF-CVE file. skipping CVE-2020-11759 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-11722 skipping CVE-2020-11669 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-11653 skipping CVE-2020-11656 as CVE page is older than CVRF-CVE file. skipping CVE-2020-11655 as CVE page is older than CVRF-CVE file. skipping CVE-2020-11612 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11538 skipping CVE-2020-11501 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11110 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2020-11110 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11100 skipping CVE-2020-11102 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11078 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-11078 skipping CVE-2020-11077 as CVE page is older than CVRF-CVE file. skipping CVE-2020-11076 as CVE page is older than CVRF-CVE file. CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11023: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11023: no packages for SUSE Package Hub 15 SP1, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry? CVE-2020-11023: no packages for SUSE Liberty Linux 8, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11023: no packages for SUSE Package Hub 12, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11023: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry? CVE-2020-11023: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11023: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11023: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11023: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11023: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11023: no packages for openSUSE Leap 15.2, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Liberty Linux 7, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11023: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for openSUSE Leap 15.1, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11023: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11023: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11023: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11023: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11023: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11023: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11023: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11023: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11023: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11023: no packages for SUSE Liberty Linux 7, but entry? CVE-2020-11023: no packages for SUSE Liberty Linux 8, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11023: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11023: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11023: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11023: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11023: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11023: no packages for SUSE Package Hub 12, but entry? CVE-2020-11023: no packages for SUSE Package Hub 15 SP1, but entry? CVE-2020-11023: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-11023: no packages for openSUSE Leap 15.1, but entry? CVE-2020-11023: no packages for openSUSE Leap 15.2, but entry? CVE-2020-11023: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11023: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11023: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11023: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11023: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11023: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11023: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11023: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry? CVE-2020-11023: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11023: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11023: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11023: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11023: no packages for SUSE Liberty Linux 7, but entry? CVE-2020-11023: no packages for SUSE Liberty Linux 8, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11023: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11023: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11023: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11023: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11023: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11023: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11023: no packages for SUSE Package Hub 12, but entry? CVE-2020-11023: no packages for SUSE Package Hub 15 SP1, but entry? CVE-2020-11023: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-11023: no packages for openSUSE Leap 15.1, but entry? CVE-2020-11023: no packages for openSUSE Leap 15.2, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.0, but entry? CVE-2020-11022: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11022: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-11022: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11022: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11022: no packages for SUSE Package Hub 15 SP1, but entry? CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11022: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11022: no packages for SUSE Package Hub 12, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11022: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-11022: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.1, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11022: no packages for SUSE Manager Server 3.2, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.0, but entry? CVE-2020-11022: no packages for openSUSE Leap 15.1, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11022: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11022: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11022: no packages for openSUSE Leap 15.2, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11022: no packages for SUSE Liberty Linux 7, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.1, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy 3.2, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11022: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11022: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11022: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11022: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11022: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11022: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11022: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11022: no packages for SUSE Liberty Linux 7, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy 3.2, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.0, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.1, but entry? CVE-2020-11022: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11022: no packages for SUSE Manager Server 3.2, but entry? CVE-2020-11022: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.0, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.1, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11022: no packages for SUSE Package Hub 12, but entry? CVE-2020-11022: no packages for SUSE Package Hub 15 SP1, but entry? CVE-2020-11022: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-11022: no packages for openSUSE Leap 15.1, but entry? CVE-2020-11022: no packages for openSUSE Leap 15.2, but entry? CVE-2020-11022: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-11022: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-11022: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-11022: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-11022: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-11022: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-11022: no packages for Container bci/openjdk:latest, but entry? CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-11022: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Proxy, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Proxy, but entry? CVE-2020-11022: no packages for Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-11022: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-11022: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-11022: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-11022: no packages for SUSE Liberty Linux 7, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP3, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP3, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-11022: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy 3.2, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.0, but entry? CVE-2020-11022: no packages for SUSE Manager Proxy Module 4.1, but entry? CVE-2020-11022: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-11022: no packages for SUSE Manager Server 3.2, but entry? CVE-2020-11022: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.0, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.1, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-11022: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-11022: no packages for SUSE Package Hub 12, but entry? CVE-2020-11022: no packages for SUSE Package Hub 15 SP1, but entry? CVE-2020-11022: no packages for SUSE Package Hub 15 SP2, but entry? CVE-2020-11022: no packages for openSUSE Leap 15.1, but entry? CVE-2020-11022: no packages for openSUSE Leap 15.2, but entry? no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-11008 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10997 no cpe found for SUSE Package Hub 15 SP4 in CVE-2020-10997 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10995 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10994 skipping CVE-2020-10942 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10938 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-10932 skipping CVE-2020-10933 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10931 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-10878 No V5 entry found for CVE-2020-10872 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10872.json:No such file or directory no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10812 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10811 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10810 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2020-10809 no cpe found for SUSE Package Hub 15 in CVE-2020-10804 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10804 no cpe found for SUSE Package Hub 15 in CVE-2020-10803 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10803 no cpe found for SUSE Package Hub 15 in CVE-2020-10802 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10802 skipping CVE-2020-10781 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-10772 skipping CVE-2020-10773 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10769 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10761 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10755 skipping CVE-2020-10757 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10756 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10754 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10751 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10744 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-10744 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10743 skipping CVE-2020-10742 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-10735 skipping CVE-2020-10736 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-10735.xml 2024-10-22 04:17:43.247395000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-10735.xml.new 2024-10-29 02:14:29.394887000 +0100 @@ -14,13 +14,13 @@ 1 - 139 - 2024-10-22T02:17:42Z + 140 + 2024-10-29T01:14:28Z current 2022-09-05T23:48:28Z - 2024-10-22T02:17:42Z + 2024-10-29T01:14:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2787,6 +2787,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36-3.6.15-32.2 @@ -7590,6 +7608,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python38-3.8.14-1.1 as a component of openSUSE Tumbleweed @@ -9702,6 +9738,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python38-3.8.14-1.1 openSUSE Tumbleweed:python38-32bit-3.8.14-1.1 openSUSE Tumbleweed:python38-curses-3.8.14-1.1 skipping CVE-2020-10732 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10729 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-10729 skipping CVE-2020-10726 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10725 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10720 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10717 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10711 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10708 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10702 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10701 as CVE page is older than CVRF-CVE file. CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2020-10696: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry? CVE-2020-10696: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry? CVE-2020-10696: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2020-10696: no packages for Container bci/nodejs:12-17.28, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry? CVE-2020-10696: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2020-10696: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-10696: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-10696: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry? CVE-2020-10696: no packages for Container bci/bci-init:15.3.21.22, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2020-10696: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-10696: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry? CVE-2020-10696: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry? CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2020-10696: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2020-10696: no packages for Container suse/sle15:15.3.17.20.57, but entry? CVE-2020-10696: no packages for Container bci/bci-minimal:15.3.32.15, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2020-10696: no packages for Container bci/python:3.9-20.4, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-10696 CVE-2020-10696: no packages for Container bci/bci-init:15.3.21.22, but entry? CVE-2020-10696: no packages for Container bci/bci-minimal:15.3.32.15, but entry? CVE-2020-10696: no packages for Container bci/nodejs:12-17.28, but entry? CVE-2020-10696: no packages for Container bci/python:3.9-20.4, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry? CVE-2020-10696: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry? CVE-2020-10696: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry? CVE-2020-10696: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2020-10696: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry? CVE-2020-10696: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry? CVE-2020-10696: no packages for Container suse/sle15:15.3.17.20.57, but entry? CVE-2020-10696: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry? CVE-2020-10696: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry? CVE-2020-10696: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry? CVE-2020-10696: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2020-10696: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2020-10696: no packages for openSUSE Leap Micro 5.2, but entry? CVE-2020-10696: no packages for Container bci/bci-init:15.3.21.22, but entry? CVE-2020-10696: no packages for Container bci/bci-minimal:15.3.32.15, but entry? CVE-2020-10696: no packages for Container bci/nodejs:12-17.28, but entry? CVE-2020-10696: no packages for Container bci/python:3.9-20.4, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/grafana:8.3.10.2.2.285, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/haproxy:2.0.14.3.5.330, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/keepalived:2.0.19.3.5.316, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-alertmanager:0.23.0.3.2.368, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-node-exporter:1.3.0.3.2.359, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-server:2.32.1.3.2.352, but entry? CVE-2020-10696: no packages for Container ses/7.1/ceph/prometheus-snmp_notifier:1.2.1.2.2.341, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/cephcsi:v3.7.0.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-attacher:v4.1.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-node-driver-registrar:v2.7.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-provisioner:v3.4.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-resizer:v1.7.0, but entry? CVE-2020-10696: no packages for Container ses/7.1/cephcsi/csi-snapshotter:v6.2.1, but entry? CVE-2020-10696: no packages for Container ses/7.1/rook/ceph:1.10.1.16.4.5.328, but entry? CVE-2020-10696: no packages for Container suse/ltss/sle15.3/bci-base:latest, but entry? CVE-2020-10696: no packages for Container suse/sle-micro-rancher/5.2:latest, but entry? CVE-2020-10696: no packages for Container suse/sle-micro/5.1/toolbox:12.1-2.2.377, but entry? CVE-2020-10696: no packages for Container suse/sle-micro/5.2/toolbox:12.1-6.2.199, but entry? CVE-2020-10696: no packages for Container suse/sle15:15.3.17.20.57, but entry? CVE-2020-10696: no packages for Container trento/trento-db:14.5-rev1.0.0-build2.2.178, but entry? CVE-2020-10696: no packages for Container trento/trento-runner:1.1.0-build4.19.12, but entry? CVE-2020-10696: no packages for Container trento/trento-wanda:1.0.0-build1.5.2, but entry? CVE-2020-10696: no packages for Container trento/trento-web:1.2.0-build4.18.11, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Aliyun, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-EC2, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-CHOST-BYOS-SAP-CCloud, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-HPC-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-1-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-Micro-5-2-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAP-BYOS-GCE, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-10696: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.1, but entry? CVE-2020-10696: no packages for SUSE Linux Enterprise Micro 5.2, but entry? CVE-2020-10696: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP3, but entry? CVE-2020-10696: no packages for openSUSE Leap Micro 5.2, but entry? no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10691 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-10691 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10685 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-10685 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10684 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-10684 skipping CVE-2020-10683 as CVE page is older than CVRF-CVE file. skipping CVE-2020-10663 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10593 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-10593 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10592 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-10592 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-10543 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-10531 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-10531 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10379 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10378 No V5 entry found for CVE-2020-10370 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10370.json:No such file or directory No V5 entry found for CVE-2020-10369 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10369.json:No such file or directory No V5 entry found for CVE-2020-10368 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10368.json:No such file or directory No V5 entry found for CVE-2020-10367 / /home/securitybot/prod/cve-database/cvelistV5/cves/2020/10xxxx/CVE-2020-10367.json:No such file or directory skipping CVE-2020-10251 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10177 skipping CVE-2020-10188 as CVE page is older than CVRF-CVE file. CVE-2020-10109: no packages for openSUSE Leap 15.4, but entry? no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10109 CVE-2020-10109: no packages for openSUSE Leap 15.4, but entry? CVE-2020-10109: no packages for openSUSE Leap 15.4, but entry? skipping CVE-2020-10134 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-10108 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-10030 skipping CVE-2020-9948 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-9543 skipping CVE-2020-9490 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-9402 skipping CVE-2020-9431 as CVE page is older than CVRF-CVE file. skipping CVE-2020-9430 as CVE page is older than CVRF-CVE file. skipping CVE-2020-9429 as CVE page is older than CVRF-CVE file. skipping CVE-2020-9428 as CVE page is older than CVRF-CVE file. skipping CVE-2020-9391 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-9359 skipping CVE-2020-9308 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2020-9273 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-9273 no cpe found for SUSE Package Hub 15 in CVE-2020-9272 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-9272 no cpe found for SUSE Package Hub 15 in CVE-2020-8955 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8955 CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-8908: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-8908: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-8908: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-8908: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-8908: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-8908: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-8908: no packages for Container bci/openjdk:latest, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-8908: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-8908 CVE-2020-8908: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-8908: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-8908: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-8908: no packages for Container bci/openjdk:latest, but entry? CVE-2020-8908: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-8908: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-8908: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-8908: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-8908: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-8908: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-8908: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-8908: no packages for Container bci/openjdk:latest, but entry? CVE-2020-8908: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-8908: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-8908: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-8908: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-8908: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-8908: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-8908: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-8908: no packages for SUSE Manager Server 4.2, but entry? skipping CVE-2020-8927 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8835 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8813 skipping CVE-2020-8832 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-8695 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-8694 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-8663 skipping CVE-2020-8649 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8648 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8647 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8619 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8618 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-8597 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2020-8492 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-8492.xml 2024-10-14 02:57:25.581081000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-8492.xml.new 2024-10-29 02:15:23.926005000 +0100 @@ -14,13 +14,13 @@ 1 - 233 - 2024-10-14T00:57:24Z + 234 + 2024-10-29T01:15:23Z current 2021-05-30T14:38:00Z - 2024-10-14T00:57:24Z + 2024-10-29T01:15:23Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -4042,6 +4042,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -11788,6 +11806,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -14792,6 +14828,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2020-8428 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8315 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8295 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8295 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-8295 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8294 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8294 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-8294 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8293 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8293 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-8293 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8233 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8233 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8228 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8228 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8183 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8183 skipping CVE-2020-8184 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8169 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8167 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8166 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8165 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8164 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8155 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8155 skipping CVE-2020-8161 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8154 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8154 no cpe found for SUSE Package Hub 15 in CVE-2020-8119 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8119 no cpe found for SUSE Package Hub 15 in CVE-2020-8118 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8118 skipping CVE-2020-8112 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8032 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8026 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8026 skipping CVE-2020-8028 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8027 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8024 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-8024 skipping CVE-2020-8023 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-8015 skipping CVE-2020-8016 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8003 as CVE page is older than CVRF-CVE file. skipping CVE-2020-8002 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools Beta for SLE Micro 5 in CVE-2020-7753 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-7753 skipping CVE-2020-7663 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7471 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7237 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7212 skipping CVE-2020-7221 as CVE page is older than CVRF-CVE file. skipping CVE-2020-7217 as CVE page is older than CVRF-CVE file. skipping CVE-2020-7216 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7106 skipping CVE-2020-7053 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7043 skipping CVE-2020-7045 as CVE page is older than CVRF-CVE file. skipping CVE-2020-7044 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7042 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7041 no cpe found for SUSE Package Hub 15 in CVE-2020-7040 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-7040 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7019 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7017 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7016 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7015 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7014 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7013 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7012 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-7009 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6860 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6831 skipping CVE-2020-6851 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6817 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6816 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6802 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6625 skipping CVE-2020-6750 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6624 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6615 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6614 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6613 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6612 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6611 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6610 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6609 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6576 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6576 skipping CVE-2020-6582 as CVE page is older than CVRF-CVE file. skipping CVE-2020-6581 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6575 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6575 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6574 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6574 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6573 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6573 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6571 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6571 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6570 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6570 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6569 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6569 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6568 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6568 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6567 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6567 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6566 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6566 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6565 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6565 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6564 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6564 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6563 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6563 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6562 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6562 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6561 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6561 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6560 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6560 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6559 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6559 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6558 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6558 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6557 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6557 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6555 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6555 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6554 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6554 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6553 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6553 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6552 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6552 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6551 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6551 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6550 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6550 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6549 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6549 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6548 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6548 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6547 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6547 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6546 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6546 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6545 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6545 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6544 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6544 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6543 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6543 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6542 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6542 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6541 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6541 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6540 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6540 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6539 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6539 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6538 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6538 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6537 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6537 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6536 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6536 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6535 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6535 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6534 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6534 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6533 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6533 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6532 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6532 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6531 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6531 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6530 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6530 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6529 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6529 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6528 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6528 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6527 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6527 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6526 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6526 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6525 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6525 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6524 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6524 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6523 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6523 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6522 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6522 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6521 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6521 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6520 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6520 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6519 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6519 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6518 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6518 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6517 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6517 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6516 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6516 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6515 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6515 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6514 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6514 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6513 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6513 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6512 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6512 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6511 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6511 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6510 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6510 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6509 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-6509 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6507 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6506 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6505 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6496 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6495 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6494 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6493 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6491 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6490 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6489 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6488 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6487 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6486 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6485 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6484 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6483 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6482 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6481 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6480 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6479 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6478 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6477 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6476 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6475 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6474 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6473 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6472 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6471 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6470 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6469 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6468 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6467 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6466 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6465 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6464 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6463 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6462 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6460 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6459 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6458 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6457 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6456 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6455 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6454 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6452 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6451 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6450 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6449 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6448 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6447 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6446 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6445 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6444 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6443 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6442 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6441 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6440 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6439 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6438 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6437 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6436 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6435 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6434 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6433 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6432 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6431 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6430 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6429 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6428 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6427 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6426 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6425 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6424 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6423 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6422 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6417 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6416 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6415 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6414 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6413 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6412 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6411 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6410 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6409 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6408 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6406 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6405 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6404 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6403 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6402 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6401 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6400 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6399 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6398 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6397 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6396 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6395 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6394 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6393 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6392 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6391 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6390 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6389 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6388 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6387 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6385 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6382 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6381 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6380 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6379 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6378 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6377 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-6095 skipping CVE-2020-6096 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2020-5504 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-5504 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5419 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-5395 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5390 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5313 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5312 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5311 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5310 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-5283 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-5283 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5260 skipping CVE-2020-5267 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-5236 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-5202 skipping CVE-2020-3868 as CVE page is older than CVRF-CVE file. skipping CVE-2020-3867 as CVE page is older than CVRF-CVE file. skipping CVE-2020-3865 as CVE page is older than CVRF-CVE file. skipping CVE-2020-3864 as CVE page is older than CVRF-CVE file. skipping CVE-2020-3862 as CVE page is older than CVRF-CVE file. CVE-2020-2934: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-2934: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-2934: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-2934: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-2934: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-2934: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-2934: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-2934: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-2934: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-2934: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-2934: no packages for Container bci/openjdk:latest, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-2934: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-2934: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-2934: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-2934: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-2934: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-2934: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-2934: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-2934: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-2934: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-2934: no packages for Container bci/openjdk:latest, but entry? CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-2934: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-2934: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-2934: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-2934: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-2934: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-2934: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-2934: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-2934: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-2934: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-2934: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-2934: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-2934: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-2934: no packages for Container bci/openjdk:latest, but entry? CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-2934: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-2934: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-2934: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-2934: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-2934: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-2934: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-2934: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-2934: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-2934: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-2934: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-2934: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-2934: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-2934: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-2933: no packages for Container bci/openjdk:latest, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-2933: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-2933: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-2933: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2933: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-2933: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-2933: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-2933: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-2933: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-2933: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-2933: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-2933: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-2933: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-2933: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-2933: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-2933: no packages for Container bci/openjdk:latest, but entry? CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-2933: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-2933: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-2933: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-2933: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-2933: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-2933: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-2933: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-2933: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-2933: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-2933: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-2933: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-2933: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-2933: no packages for Container bci/openjdk:latest, but entry? CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-2933: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-2933: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-2933: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-2933: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-2933: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-2933: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-2933: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-2933: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-2933: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-2933: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-2933: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-2933: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-2875: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-2875: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-2875: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-2875: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-2875: no packages for Container bci/openjdk:latest, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-2875: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-2875: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-2875: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-2875: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-2875: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-2875: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-2875: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-2875: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-2875: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-2875: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-2875: no packages for Container bci/openjdk:latest, but entry? CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-2875: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-2875: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-2875: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-2875: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-2875: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-2875: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2020-2875: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-2875: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-2875: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-2875: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-2875: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-2875: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-2875: no packages for Container bci/openjdk:latest, but entry? CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-2875: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-2875: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-2875: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-2875: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-2875: no packages for SUSE Enterprise Storage 7, but entry? CVE-2020-2875: no packages for SUSE Enterprise Storage 7.1, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Real Time 15 SP3, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP2-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP3-LTSS, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP2, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP3, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-2875: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-2875: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-2875: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-2875: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-2875: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2020-2875: no packages for SUSE Manager Server Module 4.3, but entry? no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2830 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2812 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2805 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2803 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2800 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2781 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2780 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2773 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2757 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2756 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-2752 skipping CVE-2020-2732 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2659 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2655 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2604 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2601 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2593 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2590 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2585 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2583 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2574 as CVE page is older than CVRF-CVE file. skipping CVE-2020-2521 as CVE page is older than CVRF-CVE file. skipping CVE-2020-1971 as CVE page is older than CVRF-CVE file. skipping CVE-2020-1968 as CVE page is older than CVRF-CVE file. skipping CVE-2020-1967 as CVE page is older than CVRF-CVE file. CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-1945: no packages for Container bci/openjdk:latest, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-1945: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-1945: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-1945: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-1945: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-1945: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-1945: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-1945: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-1945: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-1945: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-1945: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-1945: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-1945: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-1945: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-1945: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-1945: no packages for Container bci/openjdk:latest, but entry? CVE-2020-1945: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-1945: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-1945: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-1945: no packages for SUSE Manager Server 4.2, but entry? CVE-2020-1945: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2020-1945: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2020-1945: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2020-1945: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2020-1945: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2020-1945: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2020-1945: no packages for Container bci/openjdk:latest, but entry? CVE-2020-1945: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2020-1945: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2020-1945: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2020-1945: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2020-1945: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2020-1945: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2020-1945: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2020-1945: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2020-1945: no packages for SUSE Manager Server 4.2, but entry? no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-1935 no cpe found for SUSE Package Hub 15 in CVE-2020-1773 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1773 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1773 no cpe found for SUSE Package Hub 15 in CVE-2020-1772 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1772 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1772 no cpe found for SUSE Package Hub 15 in CVE-2020-1771 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1771 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1771 no cpe found for SUSE Package Hub 15 in CVE-2020-1770 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1770 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1770 no cpe found for SUSE Package Hub 15 in CVE-2020-1769 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1769 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1769 no cpe found for SUSE Package Hub 15 in CVE-2020-1766 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1766 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1766 no cpe found for SUSE Package Hub 15 in CVE-2020-1765 no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-1765 no cpe found for SUSE Package Hub 15 SP2 in CVE-2020-1765 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1753 no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2020-1753 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1753 skipping CVE-2020-1759 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1747 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-1747.xml 2024-10-22 04:25:23.360332000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2020-1747.xml.new 2024-10-29 02:19:08.573765000 +0100 @@ -14,13 +14,13 @@ 1 - 105 - 2024-10-22T02:25:22Z + 106 + 2024-10-29T01:19:08Z current 2021-05-30T14:35:10Z - 2024-10-22T02:25:22Z + 2024-10-29T01:19:08Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -295,6 +295,11 @@ Image SLES12-SP5-EC2-SAP-On-Demand + + + Image SLES12-SP5-GCE-BYOS + + Image SLES12-SP5-GCE-SAP-BYOS @@ -1546,6 +1551,9 @@ python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand + + python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-BYOS + python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS @@ -2364,6 +2372,7 @@ Image SLES12-SP5-EC2-On-Demand:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-EC2-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-EC2-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1 + Image SLES12-SP5-GCE-BYOS:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-GCE-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-GCE-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-OCI-BYOS-BYOS:python3-PyYAML-5.1.2-3.3.1 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1746 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1746 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1740 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1739 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1739 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1738 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1738 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1737 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1737 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1736 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1735 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1734 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1734 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2020-1733 no cpe found for SUSE Package Hub 15 SP3 in CVE-2020-1733 skipping CVE-2020-1720 as CVE page is older than CVRF-CVE file. skipping CVE-2020-1700 as CVE page is older than CVRF-CVE file. skipping CVE-2020-1699 as CVE page is older than CVRF-CVE file. skipping CVE-2020-1693 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0570 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2020-0561 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-0556 skipping CVE-2020-0499 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0487 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2020-0452 skipping CVE-2020-0435 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0423 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0305 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0255 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0198 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0182 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0181 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0110 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0067 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0066 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0034 as CVE page is older than CVRF-CVE file. skipping CVE-2020-0030 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-1010305 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-1010302 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-1010301 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-1010238 no cpe found for SUSE Package Hub 15 in CVE-2019-1010224 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-1010224 no cpe found for SUSE Package Hub 15 in CVE-2019-1010223 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-1010223 no cpe found for SUSE Package Hub 15 in CVE-2019-1010222 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-1010222 skipping CVE-2019-1010204 as CVE page is older than CVRF-CVE file. skipping CVE-2019-1010180 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-1010048 no entry found for CVE-2019-1002162 / /home/securitybot/prod/cve-database/cvelist/2019/1002xxxx/CVE-2019-1002162.json:No such file or directory No V5 entry found for CVE-2019-1002162 / /home/securitybot/prod/cve-database/cvelistV5/cves/2019/1002xxxx/CVE-2019-1002162.json:No such file or directory no entry found for CVE-2019-1000029 / /home/securitybot/prod/cve-database/cvelist/2019/1000xxxx/CVE-2019-1000029.json:No such file or directory No V5 entry found for CVE-2019-1000029 / /home/securitybot/prod/cve-database/cvelistV5/cves/2019/1000xxxx/CVE-2019-1000029.json:No such file or directory no cpe found for SUSE Package Hub 15 in CVE-2019-1000021 skipping CVE-2019-1000020 as CVE page is older than CVRF-CVE file. skipping CVE-2019-1000019 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2019-25074 / /home/securitybot/prod/cve-database/cvelistV5/cves/2019/25xxxx/CVE-2019-25074.json:No such file or directory no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-25074 skipping CVE-2019-25162 as CVE page is older than CVRF-CVE file. skipping CVE-2019-25161 as CVE page is older than CVRF-CVE file. skipping CVE-2019-25160 as CVE page is older than CVRF-CVE file. skipping CVE-2019-25136 as CVE page is older than CVRF-CVE file. skipping CVE-2019-25085 as CVE page is older than CVRF-CVE file. skipping CVE-2019-25076 as CVE page is older than CVRF-CVE file. skipping CVE-2019-25059 as CVE page is older than CVRF-CVE file. skipping CVE-2019-25051 as CVE page is older than CVRF-CVE file. skipping CVE-2019-25044 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-20916 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-20916 skipping CVE-2019-20908 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-20907.xml 2024-09-23 02:07:45.838399000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-20907.xml.new 2024-10-29 02:20:00.008522000 +0100 @@ -14,13 +14,13 @@ 1 - 171 - 2024-09-23T00:07:44Z + 172 + 2024-10-29T01:19:59Z current 2021-05-30T14:34:25Z - 2024-09-23T00:07:44Z + 2024-10-29T01:19:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2925,6 +2925,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36-3.6.12-4.22.2 @@ -7140,6 +7158,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -8912,6 +8948,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2019-20892 as CVE page is older than CVRF-CVE file. skipping CVE-2019-20812 as CVE page is older than CVRF-CVE file. skipping CVE-2019-20810 as CVE page is older than CVRF-CVE file. skipping CVE-2019-20808 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20797 skipping CVE-2019-20794 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20787 skipping CVE-2019-20788 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20637 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-20633 skipping CVE-2019-20636 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20503 skipping CVE-2019-20477 as CVE page is older than CVRF-CVE file. skipping CVE-2019-20454 as CVE page is older than CVRF-CVE file. skipping CVE-2019-20422 as CVE page is older than CVRF-CVE file. skipping CVE-2019-20387 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-20378 skipping CVE-2019-20095 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-20063 skipping CVE-2019-20079 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20053 skipping CVE-2019-20054 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20021 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-20016 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20015 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20014 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20013 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20012 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20011 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20010 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-20009 skipping CVE-2019-19965 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19950 skipping CVE-2019-19953 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19952 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19951 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-19949 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-19948 skipping CVE-2019-19947 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19926 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19925 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19923 skipping CVE-2019-19922 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19918 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19918 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19917 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19917 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19911 skipping CVE-2019-19906 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19880 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19844 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19797 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19797 skipping CVE-2019-19816 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19815 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19814 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19813 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19807 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19746 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19746 skipping CVE-2019-19770 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19769 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19768 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19767 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19722 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19687 skipping CVE-2019-19602 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-19555 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19555 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19499 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2019-19499 skipping CVE-2019-19553 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19543 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19537 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19536 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19535 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19534 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19533 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19532 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19531 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19530 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19529 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19528 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19527 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19526 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19525 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19524 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19523 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19462 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-19450 skipping CVE-2019-19449 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19448 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19447 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19378 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19338 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19337 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19330 skipping CVE-2019-19332 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19319 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19318 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19275 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19274 no cpe found for SUSE Package Hub 15 in CVE-2019-19270 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19270 no cpe found for SUSE Package Hub 15 in CVE-2019-19269 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19269 skipping CVE-2019-19252 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19246 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19241 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19227 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19221 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19204 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19203 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-19118 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-19118 skipping CVE-2019-19126 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19083 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19082 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19081 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19080 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19078 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19077 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19076 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19075 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19074 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19073 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19072 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19071 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19070 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19069 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19068 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19067 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19065 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19064 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19063 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19062 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19061 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19060 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19059 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19058 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19057 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19056 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19055 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19053 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19052 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19051 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19050 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19048 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19047 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19046 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19044 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19043 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19039 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19037 as CVE page is older than CVRF-CVE file. skipping CVE-2019-19036 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19005 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-19004 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18932 skipping CVE-2019-18905 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-18901 skipping CVE-2019-18903 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18902 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18899 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-18874 skipping CVE-2019-18898 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18897 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18885 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18814 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18813 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18812 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18811 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18810 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18809 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18808 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18807 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18805 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18802 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18786 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18683 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18680 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18675 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-18658 no cpe found for SUSE Package Hub 15 in CVE-2019-18622 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18622 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-18609 skipping CVE-2019-18408 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18397 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18392 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18359 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-18348 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-18277 skipping CVE-2019-18276 as CVE page is older than CVRF-CVE file. skipping CVE-2019-18224 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-18217 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18217 skipping CVE-2019-18218 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-18197 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18197 skipping CVE-2019-18198 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-18180 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18180 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-18180 no cpe found for SUSE Package Hub 15 in CVE-2019-18179 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-18179 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-18179 skipping CVE-2019-17666 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17595 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17594 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17582 as CVE page is older than CVRF-CVE file. CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2019-17566: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2019-17566: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2019-17566: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2019-17566: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2019-17566: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2019-17566: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2019-17566: no packages for Container bci/openjdk:latest, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2019-17566: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2019-17566: no packages for SUSE Manager Server 4.2, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP, but entry? no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17566 CVE-2019-17566: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2019-17566: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2019-17566: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2019-17566: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2019-17566: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2019-17566: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2019-17566: no packages for Container bci/openjdk:latest, but entry? CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2019-17566: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2019-17566: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2019-17566: no packages for SUSE Manager Server 4.2, but entry? CVE-2019-17566: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2019-17566: no packages for SUSE Manager Server Module 4.3, but entry? CVE-2019-17566: no packages for Container bci/kiwi:9.24.43-8.6, but entry? CVE-2019-17566: no packages for Container bci/openjdk-devel:11-6.2, but entry? CVE-2019-17566: no packages for Container bci/openjdk-devel:17-14.11, but entry? CVE-2019-17566: no packages for Container bci/openjdk-devel:17-7.2, but entry? CVE-2019-17566: no packages for Container bci/openjdk:11-7.1, but entry? CVE-2019-17566: no packages for Container bci/openjdk:17-7.1, but entry? CVE-2019-17566: no packages for Container bci/openjdk:latest, but entry? CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server-attestation:5.0.0-beta2.2.16, but entry? CVE-2019-17566: no packages for Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-EC2-HVM, but entry? CVE-2019-17566: no packages for Image SLES15-SP3-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-llc, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-Azure-ltd, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-llc, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-Manager-Server-4-3-EC2-ltd, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAP-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP4-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAP-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP5-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAP-GCE, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-Azure, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-EC2, but entry? CVE-2019-17566: no packages for Image SLES15-SP6-SAPCAL-GCE, but entry? CVE-2019-17566: no packages for SUSE CaaS Platform 4.0, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP4, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Development Tools 15 SP6, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP4, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP4, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Module for Web and Scripting 15 SP6, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP1-LTSS, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Server for SAP Applications 15 SP1, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP4, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP5, but entry? CVE-2019-17566: no packages for SUSE Linux Enterprise Workstation Extension 15 SP6, but entry? CVE-2019-17566: no packages for SUSE Manager Proxy 4.2, but entry? CVE-2019-17566: no packages for SUSE Manager Retail Branch Server 4.2, but entry? CVE-2019-17566: no packages for SUSE Manager Server 4.2, but entry? CVE-2019-17566: no packages for SUSE Manager Server Module 4.2, but entry? CVE-2019-17566: no packages for SUSE Manager Server Module 4.3, but entry? skipping CVE-2019-17567 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17563 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17545 skipping CVE-2019-17546 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-17541 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-17540 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17455 skipping CVE-2019-17498 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-17402 skipping CVE-2019-17451 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17450 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17361 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17358 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17357 skipping CVE-2019-17351 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17350 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17349 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17348 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17347 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17346 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17345 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17344 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17343 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17342 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17341 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17340 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-17185 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-17134 skipping CVE-2019-17133 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-17069 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17069 skipping CVE-2019-17075 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-17068 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-17068 skipping CVE-2019-17064 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17056 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17055 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17053 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17042 as CVE page is older than CVRF-CVE file. notsure where SUSE Linux Enterprise Module for Certifications 15 SP3 is contained? skipping CVE-2019-17014 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17013 as CVE page is older than CVRF-CVE file. skipping CVE-2019-17007 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16994 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16928 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16928 skipping CVE-2019-16927 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16921 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16865 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16792 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16789 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16786 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-16785 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16779 skipping CVE-2019-16782 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16746 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16723 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-16707 skipping CVE-2019-16714 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16713 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16712 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16711 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16710 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16709 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16708 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16413 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-16375 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16375 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16375 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16328 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16275 skipping CVE-2019-16234 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16233 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16232 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16231 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16229 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16168 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16167 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-16163 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-16159 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16095 skipping CVE-2019-16115 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16094 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16093 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16092 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-16091 skipping CVE-2019-16089 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16088 as CVE page is older than CVRF-CVE file. skipping CVE-2019-16058 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-15942 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15942 no cpe found for SUSE Package Hub 15 in CVE-2019-15903 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15903 skipping CVE-2019-15927 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15926 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15925 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15924 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15923 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15922 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15921 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15920 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15919 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15918 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15917 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15916 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-15892 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15892 skipping CVE-2019-15902 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15846 skipping CVE-2019-15890 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15860 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15847 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15807 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15794 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15784 no cpe found for SUSE Package Hub 15 in CVE-2019-15757 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15757 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-15753 skipping CVE-2019-15690 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-15635 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2019-15635 skipping CVE-2019-15666 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-15624 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15624 no cpe found for SUSE Package Hub 15 in CVE-2019-15623 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15623 no cpe found for SUSE Package Hub 15 in CVE-2019-15621 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15621 no cpe found for SUSE Package Hub 15 in CVE-2019-15613 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15613 skipping CVE-2019-15601 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15587 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-15540 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15540 skipping CVE-2019-15538 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15523 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15522 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15505 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15504 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15292 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15291 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15290 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15239 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-15232 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-15232 skipping CVE-2019-15222 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15221 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15220 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15219 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15218 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15217 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15216 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15215 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15214 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15213 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15212 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15211 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15145 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15144 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15143 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15142 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15141 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15140 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15139 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15118 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15117 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15099 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15098 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15090 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-15052 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-15043 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2019-15043 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-15043 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-15026 skipping CVE-2019-15031 as CVE page is older than CVRF-CVE file. skipping CVE-2019-15030 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-14981 skipping CVE-2019-14980 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-14973 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14970 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14905 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14905 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14905 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14904 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14904 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14904 skipping CVE-2019-14901 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14900 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14899 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14898 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14895 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14870 no cpe found for SUSE Package Hub 15 SP4 in CVE-2019-14870 no cpe found for SUSE Package Hub 15 SP6 in CVE-2019-14868 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-14868.xml 2024-09-21 02:32:01.540346000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-14868.xml.new 2024-10-29 02:22:55.409847000 +0100 @@ -14,13 +14,13 @@ 1 - 32 - 2024-09-21T00:32:00Z + 33 + 2024-10-29T01:22:55Z current 2021-05-30T14:30:42Z - 2024-09-21T00:32:00Z + 2024-10-29T01:22:55Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -62,6 +62,21 @@ Image SLES12-SP5-EC2-SAP-BYOS + + + Image SLES12-SP5-GCE-BYOS + + + + + Image SLES12-SP5-GCE-SAP-BYOS + + + + + Image SLES12-SP5-GCE-SAP-On-Demand + + Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -463,6 +478,15 @@ ksh-93vu-19.3.2 as a component of Image SLES12-SP5-EC2-SAP-BYOS + + ksh-93vu-19.3.2 as a component of Image SLES12-SP5-GCE-BYOS + + + ksh-93vu-19.3.2 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + + ksh-93vu-19.3.2 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + ksh-93vu-19.3.2 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -526,6 +550,9 @@ Image SLES12-SP5-Azure-SAP-BYOS:ksh-93vu-19.3.2 Image SLES12-SP5-EC2-BYOS:ksh-93vu-19.3.2 Image SLES12-SP5-EC2-SAP-BYOS:ksh-93vu-19.3.2 + Image SLES12-SP5-GCE-BYOS:ksh-93vu-19.3.2 + Image SLES12-SP5-GCE-SAP-BYOS:ksh-93vu-19.3.2 + Image SLES12-SP5-GCE-SAP-On-Demand:ksh-93vu-19.3.2 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:ksh-93vu-19.3.2 Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:ksh-93vu-19.3.2 SUSE Liberty Linux 7:ksh-20120801-140.el7_7 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-14866 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14864 skipping CVE-2019-14865 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14859 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14858 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14858 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14856 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14856 skipping CVE-2019-14855 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14846 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14846 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14846 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14834 skipping CVE-2019-14844 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14835 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14822 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14816 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14815 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14814 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14778 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14777 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14776 no cpe found for SUSE Package Hub 15 in CVE-2019-14744 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14744 skipping CVE-2019-14763 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14751 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14615 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14587 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14586 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14560 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14558 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14535 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14534 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14533 no cpe found for SUSE Package Hub 15 SP5 in CVE-2019-14531 no cpe found for SUSE Package Hub 15 in CVE-2019-14524 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14524 no cpe found for SUSE Package Hub 15 in CVE-2019-14523 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14523 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-14513 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14498 skipping CVE-2019-14494 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14444 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14438 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14437 skipping CVE-2019-14378 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-14318 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14318 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14296 skipping CVE-2019-14293 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14292 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14291 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14290 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14289 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-14275 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-14275 skipping CVE-2019-14284 as CVE page is older than CVRF-CVE file. skipping CVE-2019-14283 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14274 skipping CVE-2019-14250 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14235 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14234 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14233 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-14232 no cpe found for SUSE Package Hub 15 in CVE-2019-13962 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13962 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13917 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13767 no cpe found for SUSE Package Hub 15 in CVE-2019-13764 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13764 no cpe found for SUSE Package Hub 15 in CVE-2019-13763 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13763 no cpe found for SUSE Package Hub 15 in CVE-2019-13762 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13762 no cpe found for SUSE Package Hub 15 in CVE-2019-13761 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13761 no cpe found for SUSE Package Hub 15 in CVE-2019-13759 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13759 no cpe found for SUSE Package Hub 15 in CVE-2019-13758 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13758 no cpe found for SUSE Package Hub 15 in CVE-2019-13757 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13757 no cpe found for SUSE Package Hub 15 in CVE-2019-13756 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13756 no cpe found for SUSE Package Hub 15 in CVE-2019-13755 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13755 no cpe found for SUSE Package Hub 15 in CVE-2019-13754 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13754 no cpe found for SUSE Package Hub 15 in CVE-2019-13753 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13753 no cpe found for SUSE Package Hub 15 in CVE-2019-13752 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13752 no cpe found for SUSE Package Hub 15 in CVE-2019-13751 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13751 no cpe found for SUSE Package Hub 15 in CVE-2019-13750 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13750 no cpe found for SUSE Package Hub 15 in CVE-2019-13749 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13749 no cpe found for SUSE Package Hub 15 in CVE-2019-13748 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13748 no cpe found for SUSE Package Hub 15 in CVE-2019-13747 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13747 no cpe found for SUSE Package Hub 15 in CVE-2019-13746 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13746 no cpe found for SUSE Package Hub 15 in CVE-2019-13745 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13745 no cpe found for SUSE Package Hub 15 in CVE-2019-13744 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13744 no cpe found for SUSE Package Hub 15 in CVE-2019-13743 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13743 no cpe found for SUSE Package Hub 15 in CVE-2019-13742 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13742 no cpe found for SUSE Package Hub 15 in CVE-2019-13741 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13741 no cpe found for SUSE Package Hub 15 in CVE-2019-13740 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13740 no cpe found for SUSE Package Hub 15 in CVE-2019-13739 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13739 no cpe found for SUSE Package Hub 15 in CVE-2019-13738 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13738 no cpe found for SUSE Package Hub 15 in CVE-2019-13737 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13737 no cpe found for SUSE Package Hub 15 in CVE-2019-13736 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13736 no cpe found for SUSE Package Hub 15 in CVE-2019-13735 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13735 no cpe found for SUSE Package Hub 15 in CVE-2019-13732 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13732 skipping CVE-2019-13734 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-13730 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13730 no cpe found for SUSE Package Hub 15 in CVE-2019-13729 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13729 no cpe found for SUSE Package Hub 15 in CVE-2019-13728 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13728 no cpe found for SUSE Package Hub 15 in CVE-2019-13727 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13727 no cpe found for SUSE Package Hub 15 in CVE-2019-13726 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13726 no cpe found for SUSE Package Hub 15 in CVE-2019-13725 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13725 no cpe found for SUSE Package Hub 15 in CVE-2019-13724 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13724 no cpe found for SUSE Package Hub 15 in CVE-2019-13723 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13723 no cpe found for SUSE Package Hub 15 in CVE-2019-13721 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13721 no cpe found for SUSE Package Hub 15 in CVE-2019-13720 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13720 no cpe found for SUSE Package Hub 15 in CVE-2019-13719 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13719 no cpe found for SUSE Package Hub 15 in CVE-2019-13718 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13718 no cpe found for SUSE Package Hub 15 in CVE-2019-13717 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13717 no cpe found for SUSE Package Hub 15 in CVE-2019-13716 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13716 no cpe found for SUSE Package Hub 15 in CVE-2019-13715 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13715 no cpe found for SUSE Package Hub 15 in CVE-2019-13714 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13714 no cpe found for SUSE Package Hub 15 in CVE-2019-13713 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13713 no cpe found for SUSE Package Hub 15 in CVE-2019-13711 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13711 no cpe found for SUSE Package Hub 15 in CVE-2019-13710 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13710 no cpe found for SUSE Package Hub 15 in CVE-2019-13709 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13709 no cpe found for SUSE Package Hub 15 in CVE-2019-13708 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13708 no cpe found for SUSE Package Hub 15 in CVE-2019-13707 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13707 no cpe found for SUSE Package Hub 15 in CVE-2019-13706 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13706 no cpe found for SUSE Package Hub 15 in CVE-2019-13705 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13705 no cpe found for SUSE Package Hub 15 in CVE-2019-13704 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13704 no cpe found for SUSE Package Hub 15 in CVE-2019-13703 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13703 no cpe found for SUSE Package Hub 15 in CVE-2019-13702 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13702 no cpe found for SUSE Package Hub 15 in CVE-2019-13701 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13701 no cpe found for SUSE Package Hub 15 in CVE-2019-13700 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13700 no cpe found for SUSE Package Hub 15 in CVE-2019-13699 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13699 no cpe found for SUSE Package Hub 15 in CVE-2019-13697 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13697 no cpe found for SUSE Package Hub 15 in CVE-2019-13696 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13696 no cpe found for SUSE Package Hub 15 in CVE-2019-13695 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13695 no cpe found for SUSE Package Hub 15 in CVE-2019-13694 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13694 no cpe found for SUSE Package Hub 15 in CVE-2019-13693 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13693 no cpe found for SUSE Package Hub 15 in CVE-2019-13688 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13688 no cpe found for SUSE Package Hub 15 in CVE-2019-13687 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13687 no cpe found for SUSE Package Hub 15 in CVE-2019-13686 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13686 no cpe found for SUSE Package Hub 15 in CVE-2019-13685 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13685 no cpe found for SUSE Package Hub 15 in CVE-2019-13683 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13683 no cpe found for SUSE Package Hub 15 in CVE-2019-13682 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13682 no cpe found for SUSE Package Hub 15 in CVE-2019-13681 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13681 no cpe found for SUSE Package Hub 15 in CVE-2019-13680 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13680 no cpe found for SUSE Package Hub 15 in CVE-2019-13679 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13679 no cpe found for SUSE Package Hub 15 in CVE-2019-13678 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13678 no cpe found for SUSE Package Hub 15 in CVE-2019-13677 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13677 no cpe found for SUSE Package Hub 15 in CVE-2019-13676 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13676 no cpe found for SUSE Package Hub 15 in CVE-2019-13675 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13675 no cpe found for SUSE Package Hub 15 in CVE-2019-13674 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13674 no cpe found for SUSE Package Hub 15 in CVE-2019-13673 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13673 no cpe found for SUSE Package Hub 15 in CVE-2019-13671 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13671 no cpe found for SUSE Package Hub 15 in CVE-2019-13670 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13670 no cpe found for SUSE Package Hub 15 in CVE-2019-13669 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13669 no cpe found for SUSE Package Hub 15 in CVE-2019-13668 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13668 no cpe found for SUSE Package Hub 15 in CVE-2019-13667 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13667 no cpe found for SUSE Package Hub 15 in CVE-2019-13666 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13666 no cpe found for SUSE Package Hub 15 in CVE-2019-13665 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13665 no cpe found for SUSE Package Hub 15 in CVE-2019-13664 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13664 no cpe found for SUSE Package Hub 15 in CVE-2019-13663 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13663 no cpe found for SUSE Package Hub 15 in CVE-2019-13662 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13662 no cpe found for SUSE Package Hub 15 in CVE-2019-13661 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13661 no cpe found for SUSE Package Hub 15 in CVE-2019-13660 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13660 no cpe found for SUSE Package Hub 15 in CVE-2019-13659 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13659 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13640 skipping CVE-2019-13648 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13638 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13636 skipping CVE-2019-13631 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13627 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13619 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-13616 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13616 no cpe found for SUSE Package Hub 15 in CVE-2019-13602 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13602 no cpe found for SUSE Package Hub 15 SP4 in CVE-2019-13590 no cpe found for SUSE Package Hub 15 SP5 in CVE-2019-13590 skipping CVE-2019-13565 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-13458 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13458 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-13458 no cpe found for SUSE Package Hub 15 in CVE-2019-13457 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13457 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-13457 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13456 skipping CVE-2019-13454 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13390 skipping CVE-2019-13391 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13313 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13309 skipping CVE-2019-13311 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13310 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13306 skipping CVE-2019-13308 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13307 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13305 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-13304 skipping CVE-2019-13301 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13300 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13299 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13298 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13297 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13296 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13295 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13272 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13233 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13225 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13224 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13207 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-13207 no cpe found for SUSE Package Hub 15 in CVE-2019-13178 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13178 skipping CVE-2019-13164 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13147 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13135 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13134 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13133 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13115 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13111 skipping CVE-2019-13112 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13110 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13109 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-13108 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2019-13068 no cpe found for SUSE Package Hub 15 in CVE-2019-13045 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-13045 skipping CVE-2019-13057 as CVE page is older than CVRF-CVE file. skipping CVE-2019-13050 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12983 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12979 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12978 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12976 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12975 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12974 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12973 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12972 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-12922 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12922 skipping CVE-2019-12921 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12900 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-12874 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12874 no cpe found for SUSE Package Hub 15 in CVE-2019-12855 no cpe found for SUSE Package Hub 15 in CVE-2019-12816 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12816 skipping CVE-2019-12819 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12818 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12817 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-12815 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12815 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12781 skipping CVE-2019-12779 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-12749 no cpe found for SUSE Package Hub 15 in CVE-2019-12746 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12746 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-12746 skipping CVE-2019-12735 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-12616 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12616 no cpe found for SUSE Package Hub 15 in CVE-2019-12594 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12594 skipping CVE-2019-12614 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-12497 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12497 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-12497 skipping CVE-2019-12456 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12455 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12454 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-12420 skipping CVE-2019-12436 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12435 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12418 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-12399 no cpe found for SUSE Package Hub 15 in CVE-2019-12387 skipping CVE-2019-12382 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12380 as CVE page is older than CVRF-CVE file. skipping CVE-2019-12378 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12308 skipping CVE-2019-12290 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-12248 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12248 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-12248 no cpe found for SUSE Package Hub 15 in CVE-2019-12222 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12222 no cpe found for SUSE Package Hub 15 in CVE-2019-12221 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12221 no cpe found for SUSE Package Hub 15 in CVE-2019-12220 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12220 no cpe found for SUSE Package Hub 15 in CVE-2019-12218 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12218 no cpe found for SUSE Package Hub 15 in CVE-2019-12217 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12217 skipping CVE-2019-12155 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-12098 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-12098 skipping CVE-2019-12068 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-11922 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11922 skipping CVE-2019-11884 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11779 skipping CVE-2019-11833 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11815 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11811 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11810 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-11768 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11768 skipping CVE-2019-11775 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11772 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11771 as CVE page is older than CVRF-CVE file. CVE-2019-11757: no packages for SUSE Liberty Linux 7, but entry? CVE-2019-11757: no packages for SUSE Liberty Linux 8, but entry? CVE-2019-11757: no packages for SUSE Liberty Linux 7, but entry? CVE-2019-11757: no packages for SUSE Liberty Linux 8, but entry? CVE-2019-11757: no packages for SUSE Liberty Linux 7, but entry? CVE-2019-11757: no packages for SUSE Liberty Linux 8, but entry? skipping CVE-2019-11756 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11727 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11683 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11599 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11598 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11597 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11556 skipping CVE-2019-11506 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11505 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11487 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11486 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-11474 skipping CVE-2019-11479 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11478 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11477 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-11473 skipping CVE-2019-11472 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11470 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-11373 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11373 no cpe found for SUSE Package Hub 15 in CVE-2019-11372 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11372 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11358 no cpe found for SUSE Package Hub 15 SP5 in CVE-2019-11358 no cpe found for SUSE Package Hub 15 SP6 in CVE-2019-11358 no cpe found for SUSE Package Hub 15 in CVE-2019-11339 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11339 no cpe found for SUSE Package Hub 15 in CVE-2019-11338 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11338 no cpe found for SUSE Package Hub 15 in CVE-2019-11328 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11328 skipping CVE-2019-11324 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-11291 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-11287 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-11281 skipping CVE-2019-11236 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11235 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11234 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11098 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11091 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11085 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11070 as CVE page is older than CVRF-CVE file. skipping CVE-2019-11068 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-11037 no cpe found for SUSE Package Hub 15 in CVE-2019-11010 skipping CVE-2019-11023 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-11009 no cpe found for SUSE Package Hub 15 in CVE-2019-11008 no cpe found for SUSE Package Hub 15 in CVE-2019-11007 no cpe found for SUSE Package Hub 15 in CVE-2019-11006 no cpe found for SUSE Package Hub 15 in CVE-2019-11005 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10879 skipping CVE-2019-10903 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10902 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10901 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10900 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10899 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10898 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10897 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10896 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10895 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10894 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10878 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10877 no cpe found for SUSE Package Hub 15 in CVE-2019-10868 skipping CVE-2019-10872 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10871 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-10784 no cpe found for SUSE Package Hub 15 SP4 in CVE-2019-10784 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10751 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10740 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-10740 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-10740 no cpe found for SUSE Package Hub 15 SP4 in CVE-2019-10740 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10732 skipping CVE-2019-10714 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-10650 skipping CVE-2019-10639 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10638 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10557 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10220 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-10217 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10217 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-10206 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10206 skipping CVE-2019-10208 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10207 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-10203 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10203 no cpe found for SUSE Package Hub 15 in CVE-2019-10163 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10163 skipping CVE-2019-10168 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10167 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10166 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10164 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-10162 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10162 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-10156 skipping CVE-2019-10161 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10160 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10153 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10149 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-10143 skipping CVE-2019-10142 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10137 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10136 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10132 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10131 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10130 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10126 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10125 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10124 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-10086 skipping CVE-2019-10098 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10097 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10094 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10093 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10092 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10088 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10082 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10081 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-10067 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-10067 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-10067 skipping CVE-2019-10063 as CVE page is older than CVRF-CVE file. skipping CVE-2019-10025 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9956 skipping CVE-2019-9959 as CVE page is older than CVRF-CVE file. CVE-2019-9947: no packages for SUSE Linux Enterprise Server 11 SP4-LTSS, but entry? CVE-2019-9947: no packages for SUSE Linux Enterprise Server 11 SP4-LTSS, but entry? CVE-2019-9947: no packages for SUSE Linux Enterprise Server 11 SP4-LTSS, but entry? skipping CVE-2019-9948 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-9947.xml 2024-09-23 02:14:43.508494000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-9947.xml.new 2024-10-29 02:26:45.411810000 +0100 @@ -14,13 +14,13 @@ 1 - 156 - 2024-09-23T00:14:43Z + 157 + 2024-10-29T01:26:44Z current 2021-05-30T14:26:26Z - 2024-09-23T00:14:43Z + 2024-10-29T01:26:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2763,6 +2763,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36-3.6.10-4.3.5 @@ -6405,6 +6423,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -7894,6 +7930,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2019-9928 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9924 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-9917 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9917 no cpe found for SUSE Package Hub 15 in CVE-2019-9898 skipping CVE-2019-9903 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-9897 no cpe found for SUSE Package Hub 15 in CVE-2019-9896 no cpe found for SUSE Package Hub 15 in CVE-2019-9895 no cpe found for SUSE Package Hub 15 in CVE-2019-9894 no cpe found for SUSE Package Hub 15 in CVE-2019-9892 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9892 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-9892 skipping CVE-2019-9857 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9824 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9779 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9778 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9777 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9776 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9775 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9774 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9773 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9772 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9771 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9770 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9755 no cpe found for SUSE Package Hub 15 in CVE-2019-9752 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9752 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-9752 skipping CVE-2019-9740 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9674 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9636 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9631 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9628 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9587 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-9545 skipping CVE-2019-9517 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9506 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-9499 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9499 no cpe found for SUSE Package Hub 15 in CVE-2019-9498 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9498 no cpe found for SUSE Package Hub 15 in CVE-2019-9497 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9497 no cpe found for SUSE Package Hub 15 in CVE-2019-9496 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9496 no cpe found for SUSE Package Hub 15 in CVE-2019-9495 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9495 no cpe found for SUSE Package Hub 15 in CVE-2019-9494 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9494 skipping CVE-2019-9475 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9458 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9457 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9450 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9449 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9448 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9447 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9446 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9445 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9433 skipping CVE-2019-9371 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9325 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9232 no cpe found for SUSE Package Hub 15 in CVE-2019-9215 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-9215 no cpe found for SUSE Package Hub 15 in CVE-2019-9211 skipping CVE-2019-9214 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9213 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9210 skipping CVE-2019-9209 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9208 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9152 skipping CVE-2019-9162 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2019-9151 skipping CVE-2019-9077 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9075 as CVE page is older than CVRF-CVE file. skipping CVE-2019-9074 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-9024 skipping CVE-2019-9003 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8980 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-8955 skipping CVE-2019-8956 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8936 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8934 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8922 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8912 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8907 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8906 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8905 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8690 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8689 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8688 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8687 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8686 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8684 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8683 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8681 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8680 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8679 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8678 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8677 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8676 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8673 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8672 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8671 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8669 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8666 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8658 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8649 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8644 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8623 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8622 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8619 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8615 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8611 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8610 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8609 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8608 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8607 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8601 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8597 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8596 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8595 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8594 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8587 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8586 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8584 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8583 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8571 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8563 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8559 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8558 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8551 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8544 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8536 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8535 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8524 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8523 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8515 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8506 as CVE page is older than CVRF-CVE file. skipping CVE-2019-8503 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-8358 skipping CVE-2019-8375 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-8075 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-8075 skipping CVE-2019-7665 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-7637 skipping CVE-2019-7638 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7636 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7635 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-7621 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-7620 no cpe found for SUSE Package Hub 15 in CVE-2019-7548 skipping CVE-2019-7578 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7577 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7576 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7575 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7574 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7573 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7572 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-7443 skipping CVE-2019-7524 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-7398 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-7397 no cpe found for SUSE Package Hub 15 in CVE-2019-7397 no cpe found for SUSE Package Hub 15 in CVE-2019-7314 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-7314 skipping CVE-2019-7317 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7310 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7308 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7292 as CVE page is older than CVRF-CVE file. skipping CVE-2019-7285 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2019-7222 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-7175 no cpe found for SUSE Package Hub 15 in CVE-2019-7165 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-7165 no cpe found for SUSE Package Hub 15 in CVE-2019-7164 skipping CVE-2019-7150 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-6978 no cpe found for SUSE Package Hub 15 in CVE-2019-6799 skipping CVE-2019-6974 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-6798 no cpe found for SUSE Package Hub 15 in CVE-2019-6690 no cpe found for SUSE Package Hub 15 in CVE-2019-6486 skipping CVE-2019-6476 as CVE page is older than CVRF-CVE file. skipping CVE-2019-6475 as CVE page is older than CVRF-CVE file. skipping CVE-2019-6467 as CVE page is older than CVRF-CVE file. skipping CVE-2019-6462 as CVE page is older than CVRF-CVE file. skipping CVE-2019-6461 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-6446 skipping CVE-2019-6454 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6292 no cpe found for SUSE Package Hub 15 in CVE-2019-6286 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-6286 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2019-6285 no cpe found for SUSE Package Hub 15 in CVE-2019-6284 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-6284 no cpe found for SUSE Package Hub 15 in CVE-2019-6283 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-6283 no cpe found for SUSE Package Hub 15 in CVE-2019-6256 skipping CVE-2019-6251 as CVE page is older than CVRF-CVE file. skipping CVE-2019-6237 as CVE page is older than CVRF-CVE file. skipping CVE-2019-6201 as CVE page is older than CVRF-CVE file. skipping CVE-2019-6133 as CVE page is older than CVRF-CVE file. skipping CVE-2019-6111 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-5953 no cpe found for SUSE Package Hub 15 in CVE-2019-5882 no cpe found for SUSE Package Hub 15 in CVE-2019-5881 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5881 no cpe found for SUSE Package Hub 15 in CVE-2019-5880 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5880 no cpe found for SUSE Package Hub 15 in CVE-2019-5879 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5879 no cpe found for SUSE Package Hub 15 in CVE-2019-5878 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5878 no cpe found for SUSE Package Hub 15 in CVE-2019-5877 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5877 no cpe found for SUSE Package Hub 15 in CVE-2019-5876 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5876 no cpe found for SUSE Package Hub 15 in CVE-2019-5875 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5875 no cpe found for SUSE Package Hub 15 in CVE-2019-5874 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5874 no cpe found for SUSE Package Hub 15 in CVE-2019-5872 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5872 no cpe found for SUSE Package Hub 15 in CVE-2019-5871 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5871 no cpe found for SUSE Package Hub 15 in CVE-2019-5870 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5870 no cpe found for SUSE Package Hub 15 in CVE-2019-5869 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5869 no cpe found for SUSE Package Hub 15 in CVE-2019-5868 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5868 no cpe found for SUSE Package Hub 15 in CVE-2019-5867 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5867 no cpe found for SUSE Package Hub 15 in CVE-2019-5865 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5865 no cpe found for SUSE Package Hub 15 in CVE-2019-5864 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5864 no cpe found for SUSE Package Hub 15 in CVE-2019-5863 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5863 no cpe found for SUSE Package Hub 15 in CVE-2019-5862 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5862 no cpe found for SUSE Package Hub 15 in CVE-2019-5861 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5861 no cpe found for SUSE Package Hub 15 in CVE-2019-5860 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5860 no cpe found for SUSE Package Hub 15 in CVE-2019-5859 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5859 no cpe found for SUSE Package Hub 15 in CVE-2019-5858 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5858 no cpe found for SUSE Package Hub 15 in CVE-2019-5857 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5857 no cpe found for SUSE Package Hub 15 in CVE-2019-5856 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5856 no cpe found for SUSE Package Hub 15 in CVE-2019-5855 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5855 no cpe found for SUSE Package Hub 15 in CVE-2019-5854 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5854 no cpe found for SUSE Package Hub 15 in CVE-2019-5853 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5853 no cpe found for SUSE Package Hub 15 in CVE-2019-5852 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5852 no cpe found for SUSE Package Hub 15 in CVE-2019-5851 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5851 no cpe found for SUSE Package Hub 15 in CVE-2019-5850 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5850 no cpe found for SUSE Package Hub 15 in CVE-2019-5848 no cpe found for SUSE Package Hub 15 in CVE-2019-5847 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5846 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5845 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5844 no cpe found for SUSE Package Hub 15 in CVE-2019-5842 no cpe found for SUSE Package Hub 15 in CVE-2019-5840 no cpe found for SUSE Package Hub 15 in CVE-2019-5839 no cpe found for SUSE Package Hub 15 in CVE-2019-5838 no cpe found for SUSE Package Hub 15 in CVE-2019-5837 no cpe found for SUSE Package Hub 15 in CVE-2019-5836 no cpe found for SUSE Package Hub 15 in CVE-2019-5835 no cpe found for SUSE Package Hub 15 in CVE-2019-5834 no cpe found for SUSE Package Hub 15 in CVE-2019-5833 no cpe found for SUSE Package Hub 15 in CVE-2019-5832 no cpe found for SUSE Package Hub 15 in CVE-2019-5831 no cpe found for SUSE Package Hub 15 in CVE-2019-5830 no cpe found for SUSE Package Hub 15 in CVE-2019-5829 no cpe found for SUSE Package Hub 15 in CVE-2019-5828 no cpe found for SUSE Package Hub 15 in CVE-2019-5827 no cpe found for SUSE Package Hub 15 in CVE-2019-5824 no cpe found for SUSE Package Hub 15 in CVE-2019-5823 no cpe found for SUSE Package Hub 15 in CVE-2019-5822 no cpe found for SUSE Package Hub 15 in CVE-2019-5821 no cpe found for SUSE Package Hub 15 in CVE-2019-5820 no cpe found for SUSE Package Hub 15 in CVE-2019-5819 no cpe found for SUSE Package Hub 15 in CVE-2019-5818 no cpe found for SUSE Package Hub 15 in CVE-2019-5817 no cpe found for SUSE Package Hub 15 in CVE-2019-5816 no cpe found for SUSE Package Hub 15 in CVE-2019-5815 no cpe found for SUSE Package Hub 15 in CVE-2019-5814 no cpe found for SUSE Package Hub 15 in CVE-2019-5813 no cpe found for SUSE Package Hub 15 in CVE-2019-5812 no cpe found for SUSE Package Hub 15 in CVE-2019-5811 no cpe found for SUSE Package Hub 15 in CVE-2019-5810 no cpe found for SUSE Package Hub 15 in CVE-2019-5809 no cpe found for SUSE Package Hub 15 in CVE-2019-5808 no cpe found for SUSE Package Hub 15 in CVE-2019-5807 no cpe found for SUSE Package Hub 15 in CVE-2019-5806 no cpe found for SUSE Package Hub 15 in CVE-2019-5805 no cpe found for SUSE Package Hub 15 in CVE-2019-5804 no cpe found for SUSE Package Hub 15 in CVE-2019-5803 no cpe found for SUSE Package Hub 15 in CVE-2019-5802 no cpe found for SUSE Package Hub 15 in CVE-2019-5801 no cpe found for SUSE Package Hub 15 in CVE-2019-5800 no cpe found for SUSE Package Hub 15 in CVE-2019-5799 no cpe found for SUSE Package Hub 15 in CVE-2019-5798 no cpe found for SUSE Package Hub 15 in CVE-2019-5797 no cpe found for SUSE Package Hub 15 in CVE-2019-5796 no cpe found for SUSE Package Hub 15 in CVE-2019-5795 no cpe found for SUSE Package Hub 15 in CVE-2019-5794 no cpe found for SUSE Package Hub 15 in CVE-2019-5793 no cpe found for SUSE Package Hub 15 in CVE-2019-5792 no cpe found for SUSE Package Hub 15 in CVE-2019-5791 no cpe found for SUSE Package Hub 15 in CVE-2019-5790 no cpe found for SUSE Package Hub 15 in CVE-2019-5789 no cpe found for SUSE Package Hub 15 in CVE-2019-5788 no cpe found for SUSE Package Hub 15 in CVE-2019-5787 no cpe found for SUSE Package Hub 15 in CVE-2019-5786 no cpe found for SUSE Package Hub 15 in CVE-2019-5784 no cpe found for SUSE Package Hub 15 in CVE-2019-5782 no cpe found for SUSE Package Hub 15 in CVE-2019-5781 no cpe found for SUSE Package Hub 15 in CVE-2019-5780 no cpe found for SUSE Package Hub 15 in CVE-2019-5779 no cpe found for SUSE Package Hub 15 in CVE-2019-5778 no cpe found for SUSE Package Hub 15 in CVE-2019-5777 no cpe found for SUSE Package Hub 15 in CVE-2019-5776 no cpe found for SUSE Package Hub 15 in CVE-2019-5775 no cpe found for SUSE Package Hub 15 in CVE-2019-5774 no cpe found for SUSE Package Hub 15 in CVE-2019-5773 no cpe found for SUSE Package Hub 15 in CVE-2019-5772 no cpe found for SUSE Package Hub 15 in CVE-2019-5771 no cpe found for SUSE Package Hub 15 in CVE-2019-5770 no cpe found for SUSE Package Hub 15 in CVE-2019-5769 no cpe found for SUSE Package Hub 15 in CVE-2019-5768 no cpe found for SUSE Package Hub 15 in CVE-2019-5767 no cpe found for SUSE Package Hub 15 in CVE-2019-5766 no cpe found for SUSE Package Hub 15 in CVE-2019-5765 no cpe found for SUSE Package Hub 15 in CVE-2019-5764 no cpe found for SUSE Package Hub 15 in CVE-2019-5763 no cpe found for SUSE Package Hub 15 in CVE-2019-5762 no cpe found for SUSE Package Hub 15 in CVE-2019-5761 no cpe found for SUSE Package Hub 15 in CVE-2019-5760 no cpe found for SUSE Package Hub 15 in CVE-2019-5759 no cpe found for SUSE Package Hub 15 in CVE-2019-5758 no cpe found for SUSE Package Hub 15 in CVE-2019-5757 no cpe found for SUSE Package Hub 15 in CVE-2019-5756 no cpe found for SUSE Package Hub 15 in CVE-2019-5755 no cpe found for SUSE Package Hub 15 in CVE-2019-5754 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2019-5747 no cpe found for SUSE Package Hub 15 in CVE-2019-5736 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5736 no cpe found for SUSE Package Hub 15 in CVE-2019-5460 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5460 skipping CVE-2019-5544 as CVE page is older than CVRF-CVE file. skipping CVE-2019-5489 as CVE page is older than CVRF-CVE file. skipping CVE-2019-5482 as CVE page is older than CVRF-CVE file. skipping CVE-2019-5481 as CVE page is older than CVRF-CVE file. skipping CVE-2019-5477 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-5459 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5459 no cpe found for SUSE Package Hub 15 in CVE-2019-5439 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5439 skipping CVE-2019-5436 as CVE page is older than CVRF-CVE file. skipping CVE-2019-5427 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-5188 skipping CVE-2019-5419 as CVE page is older than CVRF-CVE file. skipping CVE-2019-5418 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5164 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5163 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-5094 skipping CVE-2019-5108 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-5060 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5060 no cpe found for SUSE Package Hub 15 in CVE-2019-5059 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5059 no cpe found for SUSE Package Hub 15 in CVE-2019-5058 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5058 no cpe found for SUSE Package Hub 15 in CVE-2019-5057 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5057 no cpe found for SUSE Package Hub 15 in CVE-2019-5052 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5052 no cpe found for SUSE Package Hub 15 in CVE-2019-5051 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-5051 skipping CVE-2019-5021 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-5010.xml 2024-10-23 02:20:51.803559000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2019-5010.xml.new 2024-10-29 02:29:45.095883000 +0100 @@ -14,13 +14,13 @@ 1 - 158 - 2024-10-23T00:20:51Z + 159 + 2024-10-29T01:29:44Z current 2021-05-30T14:23:00Z - 2024-10-23T00:20:51Z + 2024-10-29T01:29:44Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -3036,6 +3036,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36-3.6.12-4.22.2 @@ -7635,6 +7653,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -9491,6 +9527,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2019-4473 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3896 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-3890 skipping CVE-2019-3886 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3881 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3880 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-3871 skipping CVE-2019-3870 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3863 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3862 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3861 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3860 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3859 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3858 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3857 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3856 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3855 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3846 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3844 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3843 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3842 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3840 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3838 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-3833 skipping CVE-2019-3835 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-3828 no cpe found for SUSE Package Hub 15 in CVE-2019-3828 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3828 skipping CVE-2019-3824 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-3817 skipping CVE-2019-3820 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3819 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3814 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3813 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3812 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-3807 notsure where SUSE Linux Enterprise Module for CAP 15 SP2 is contained? notsure where SUSE Linux Enterprise Module for CAP 15 SP3 is contained? notsure where SUSE Linux Enterprise Module for CAP 15 is contained? notsure where SUSE Linux Enterprise Module for CAP 15 SP1 is contained? skipping CVE-2019-3701 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3700 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3698 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3693 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3692 skipping CVE-2019-3689 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3684 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2019-3500 no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-3500 no cpe found for SUSE Package Hub 15 SP2 in CVE-2019-3500 no cpe found for SUSE Package Hub 15 SP3 in CVE-2019-3500 skipping CVE-2019-3460 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3459 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3018 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3016 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3011 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3009 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3004 as CVE page is older than CVRF-CVE file. skipping CVE-2019-3003 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2999 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2998 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2997 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2996 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2993 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2992 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2991 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2989 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2988 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2987 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2983 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2982 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2981 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2978 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2977 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2975 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2974 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2973 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2969 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2968 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2967 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2966 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2964 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2963 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2962 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2960 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2958 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2957 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2950 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2949 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2948 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2946 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2945 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2938 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2933 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2924 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2923 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2922 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2920 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2914 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2911 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2910 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2821 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2818 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2816 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2786 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2769 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2766 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2762 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2745 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2708 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2698 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2684 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2602 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2539 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2537 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2536 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2535 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2534 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2533 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2532 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2531 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2530 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2529 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2528 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2513 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2510 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2507 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2503 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2482 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2481 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2455 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2019-2435 skipping CVE-2019-2426 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2422 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-2390 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-2389 skipping CVE-2019-2215 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2126 as CVE page is older than CVRF-CVE file. skipping CVE-2019-2054 as CVE page is older than CVRF-CVE file. notsure where Security Module for SUSE Linux Enterprise 11 is contained? skipping CVE-2019-1559 as CVE page is older than CVRF-CVE file. skipping CVE-2019-1549 as CVE page is older than CVRF-CVE file. skipping CVE-2019-1547 as CVE page is older than CVRF-CVE file. skipping CVE-2019-1543 as CVE page is older than CVRF-CVE file. skipping CVE-2019-1125 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 11-PUBCLOUD in CVE-2019-0804 CVE-2019-0223: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2019-0223: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2019-0223: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? skipping CVE-2019-0221 as CVE page is older than CVRF-CVE file. skipping CVE-2019-0220 as CVE page is older than CVRF-CVE file. skipping CVE-2019-0217 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-0210 skipping CVE-2019-0211 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2019-0205 skipping CVE-2019-0199 as CVE page is older than CVRF-CVE file. skipping CVE-2019-0197 as CVE page is older than CVRF-CVE file. skipping CVE-2019-0196 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2019-0161 skipping CVE-2019-0160 as CVE page is older than CVRF-CVE file. skipping CVE-2019-0155 as CVE page is older than CVRF-CVE file. skipping CVE-2019-0136 as CVE page is older than CVRF-CVE file. no entry found for CVE-2018-1002161 / /home/securitybot/prod/cve-database/cvelist/2018/1002xxxx/CVE-2018-1002161.json:No such file or directory No V5 entry found for CVE-2018-1002161 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/1002xxxx/CVE-2018-1002161.json:No such file or directory skipping CVE-2018-1000880 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000879 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000878 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000877 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000876 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-1000816 skipping CVE-2018-1000845 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security in CVE-2018-1000807 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2018-1000807.xml 2024-10-24 02:20:55.318586000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2018-1000807.xml.new 2024-10-29 02:31:29.448957000 +0100 @@ -14,13 +14,13 @@ 1 - 105 - 2024-10-24T00:20:53Z + 106 + 2024-10-29T01:31:28Z current 2021-05-30T14:20:45Z - 2024-10-24T00:20:53Z + 2024-10-29T01:31:28Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2547,8 +2547,8 @@ python-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-BYOS - - python-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-BYOS + + python-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-BYOS python-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-BYOS @@ -2556,8 +2556,8 @@ python3-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-BYOS - - python3-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-BYOS + + python3-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-BYOS python3-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-BYOS @@ -2574,8 +2574,8 @@ python-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - python-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + python-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS python-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS @@ -2583,8 +2583,8 @@ python3-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - python3-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + python3-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS python3-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS @@ -2592,8 +2592,8 @@ python-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - python-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + python-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand python-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand @@ -2601,8 +2601,8 @@ python3-cryptography-1.3.1-7.13.4 as a component of Image SLES12-SP5-GCE-SAP-On-Demand - - python3-pyOpenSSL-17.1.0-4.26.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + python3-pyOpenSSL-17.1.0-4.29.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand python3-setuptools-18.0.1-4.8.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand @@ -4436,25 +4436,25 @@ Image SLES12-SP5-EC2-SAP-On-Demand:python3-pyOpenSSL-17.1.0-4.26.1 Image SLES12-SP5-EC2-SAP-On-Demand:python3-setuptools-18.0.1-4.8.1 Image SLES12-SP5-GCE-BYOS:python-cryptography-1.3.1-7.13.4 - Image SLES12-SP5-GCE-BYOS:python-pyOpenSSL-17.1.0-4.26.1 + Image SLES12-SP5-GCE-BYOS:python-pyOpenSSL-17.1.0-4.29.1 Image SLES12-SP5-GCE-BYOS:python-setuptools-18.0.1-4.8.1 Image SLES12-SP5-GCE-BYOS:python3-cryptography-1.3.1-7.13.4 - Image SLES12-SP5-GCE-BYOS:python3-pyOpenSSL-17.1.0-4.26.1 + Image SLES12-SP5-GCE-BYOS:python3-pyOpenSSL-17.1.0-4.29.1 Image SLES12-SP5-GCE-BYOS:python3-setuptools-18.0.1-4.8.1 Image SLES12-SP5-GCE-On-Demand:python3-cryptography-1.3.1-7.13.4 Image SLES12-SP5-GCE-On-Demand:python3-pyOpenSSL-17.1.0-4.26.1 Image SLES12-SP5-GCE-On-Demand:python3-setuptools-18.0.1-4.8.1 Image SLES12-SP5-GCE-SAP-BYOS:python-cryptography-1.3.1-7.13.4 - Image SLES12-SP5-GCE-SAP-BYOS:python-pyOpenSSL-17.1.0-4.26.1 + Image SLES12-SP5-GCE-SAP-BYOS:python-pyOpenSSL-17.1.0-4.29.1 Image SLES12-SP5-GCE-SAP-BYOS:python-setuptools-18.0.1-4.8.1 Image SLES12-SP5-GCE-SAP-BYOS:python3-cryptography-1.3.1-7.13.4 - Image SLES12-SP5-GCE-SAP-BYOS:python3-pyOpenSSL-17.1.0-4.26.1 + Image SLES12-SP5-GCE-SAP-BYOS:python3-pyOpenSSL-17.1.0-4.29.1 Image SLES12-SP5-GCE-SAP-BYOS:python3-setuptools-18.0.1-4.8.1 Image SLES12-SP5-GCE-SAP-On-Demand:python-cryptography-1.3.1-7.13.4 - Image SLES12-SP5-GCE-SAP-On-Demand:python-pyOpenSSL-17.1.0-4.26.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python-pyOpenSSL-17.1.0-4.29.1 Image SLES12-SP5-GCE-SAP-On-Demand:python-setuptools-18.0.1-4.8.1 Image SLES12-SP5-GCE-SAP-On-Demand:python3-cryptography-1.3.1-7.13.4 - Image SLES12-SP5-GCE-SAP-On-Demand:python3-pyOpenSSL-17.1.0-4.26.1 + Image SLES12-SP5-GCE-SAP-On-Demand:python3-pyOpenSSL-17.1.0-4.29.1 Image SLES12-SP5-GCE-SAP-On-Demand:python3-setuptools-18.0.1-4.8.1 Image SLES12-SP5-OCI-BYOS-BYOS:python3-cryptography-1.3.1-7.13.4 Image SLES12-SP5-OCI-BYOS-BYOS:python3-pyOpenSSL-16.0.0-4.11.3 no cpe found for SUSE Package Hub 15 in CVE-2018-1000801 skipping CVE-2018-1000805 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000802 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000654 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000632 as CVE page is older than CVRF-CVE file. CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Container suse/sle15:15.1.6.2.811, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-1000518 CVE-2018-1000518: no packages for Container suse/sle15:15.1.6.2.811, but entry? CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? CVE-2018-1000518: no packages for Container suse/sle15:15.1.6.2.811, but entry? CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-EC2-HVM, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-BYOS-GCE, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-EC2-HVM, but entry? CVE-2018-1000518: no packages for Image SLES15-SP2-SAP-GCE, but entry? CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-LI-BYOS-Production, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS, but entry? CVE-2018-1000518: no packages for Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Installer Updates 15 SP1, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP6, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP5, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Public Cloud 15 SP6, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP4, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP5, but entry? CVE-2018-1000518: no packages for SUSE Linux Enterprise Module for Server Applications 15 SP6, but entry? no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-1000517 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-1000500 skipping CVE-2018-1000301 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000300 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000226 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000225 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000223 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000204 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000199 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000140 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000135 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000122 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000120 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2018-1000115 skipping CVE-2018-1000030 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000005 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000004 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1000001 as CVE page is older than CVRF-CVE file. skipping CVE-2018-25103 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2018-25099 skipping CVE-2018-25091 as CVE page is older than CVRF-CVE file. skipping CVE-2018-25032 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-25014 skipping CVE-2018-25015 as CVE page is older than CVRF-CVE file. skipping CVE-2018-25013 as CVE page is older than CVRF-CVE file. skipping CVE-2018-25012 as CVE page is older than CVRF-CVE file. skipping CVE-2018-25011 as CVE page is older than CVRF-CVE file. skipping CVE-2018-25010 as CVE page is older than CVRF-CVE file. skipping CVE-2018-25009 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-21232 skipping CVE-2018-21010 as CVE page is older than CVRF-CVE file. skipping CVE-2018-21009 as CVE page is older than CVRF-CVE file. skipping CVE-2018-21008 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20969 skipping CVE-2018-20976 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20856 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20855 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-20846 skipping CVE-2018-20847 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-20822 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20822 skipping CVE-2018-20843 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20839 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20836 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-20821 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20821 skipping CVE-2018-20815 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20786 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20784 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20781 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-20743 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20743 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20726 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20725 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20724 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20723 no cpe found for SUSE Package Hub 15 in CVE-2018-20721 skipping CVE-2018-20712 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-20683 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-20679 skipping CVE-2018-20671 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20651 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20623 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20574 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2018-20573 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20534 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20533 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20532 skipping CVE-2018-20511 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-20467 skipping CVE-2018-20433 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20406 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20346 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2018-20319 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/20xxxx/CVE-2018-20319.json:No such file or directory CVE-2018-20319: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2018-20319: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP5, but entry? CVE-2018-20319: no packages for SUSE Linux Enterprise Module for Basesystem 15 SP6, but entry? CVE-2018-20319: no packages for SUSE Linux Enterprise Server 15 SP4-TERADATA, but entry? no cpe found for SUSE Package Hub 15 in CVE-2018-20230 no cpe found for SUSE Package Hub 15 in CVE-2018-20190 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20190 skipping CVE-2018-20217 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20216 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20191 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-20189 no cpe found for SUSE Package Hub 15 in CVE-2018-20184 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20182 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20181 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20180 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20179 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20178 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20177 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20176 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20175 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-20174 skipping CVE-2018-20169 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20126 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20125 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20124 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20123 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-20099 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-20098 skipping CVE-2018-20097 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-20073 skipping CVE-2018-20060 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20024 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20023 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20022 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20021 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20020 as CVE page is older than CVRF-CVE file. skipping CVE-2018-20019 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-19985 no cpe found for SUSE Package Hub 15 in CVE-2018-19970 no cpe found for SUSE Package Hub 15 in CVE-2018-19969 no cpe found for SUSE Package Hub 15 in CVE-2018-19968 skipping CVE-2018-19932 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19931 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19873 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19871 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19870 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19869 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19869 no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-19869 no cpe found for SUSE Package Hub 15 in CVE-2018-19865 no cpe found for SUSE Package Hub 15 in CVE-2018-19857 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19857 skipping CVE-2018-19854 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-19839 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19839 no cpe found for SUSE Package Hub 15 in CVE-2018-19838 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19838 no cpe found for SUSE Package Hub 15 in CVE-2018-19837 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19837 no cpe found for SUSE Package Hub 15 in CVE-2018-19827 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19827 no cpe found for SUSE Package Hub 15 in CVE-2018-19802 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19802 skipping CVE-2018-19824 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-19801 no cpe found for SUSE Package Hub 15 in CVE-2018-19800 no cpe found for SUSE Package Hub 15 in CVE-2018-19797 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19797 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-19760 skipping CVE-2018-19758 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19627 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19626 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19625 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19624 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19623 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19622 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19591 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19542 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19541 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19540 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19539 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19519 no cpe found for SUSE Package Hub 15 in CVE-2018-19516 skipping CVE-2018-19492 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-19443 skipping CVE-2018-19432 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19407 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19387 no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-19387 no cpe found for SUSE Package Hub 15 in CVE-2018-19295 skipping CVE-2018-19211 as CVE page is older than CVRF-CVE file. skipping CVE-2018-19210 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19208 no cpe found for SUSE Package Hub 15 in CVE-2018-19200 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19199 no cpe found for SUSE Package Hub 15 in CVE-2018-19199 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-19198 no cpe found for SUSE Package Hub 15 in CVE-2018-19198 no cpe found for SUSE Package Hub 15 in CVE-2018-19143 no cpe found for SUSE Package Hub 15 in CVE-2018-19141 skipping CVE-2018-19134 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-19052 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19052 no cpe found for SUSE Package Hub 15 in CVE-2018-19046 no cpe found for SUSE Package Hub 15 in CVE-2018-19045 no cpe found for SUSE Package Hub 15 in CVE-2018-19044 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-19039 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-18915 no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-18839 no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-18839 no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-18838 no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-18838 no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-18837 no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-18837 no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-18836 no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-18836 no cpe found for SUSE Package Hub 15 in CVE-2018-18820 no cpe found for SUSE Package Hub 15 in CVE-2018-18718 skipping CVE-2018-18751 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-18710 skipping CVE-2018-18690 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18661 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18650 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-18625 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-18625 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-18624 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-18624 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-18623 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-18623 skipping CVE-2018-18607 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18606 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18605 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18541 skipping CVE-2018-18559 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18557 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18544 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18521 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18520 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18484 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18483 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18459 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18458 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18457 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18455 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18445 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-18386 skipping CVE-2018-18397 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-18359 no cpe found for SUSE Package Hub 15 in CVE-2018-18358 no cpe found for SUSE Package Hub 15 in CVE-2018-18357 no cpe found for SUSE Package Hub 15 in CVE-2018-18356 no cpe found for SUSE Package Hub 15 in CVE-2018-18355 no cpe found for SUSE Package Hub 15 in CVE-2018-18354 no cpe found for SUSE Package Hub 15 in CVE-2018-18353 no cpe found for SUSE Package Hub 15 in CVE-2018-18352 no cpe found for SUSE Package Hub 15 in CVE-2018-18351 no cpe found for SUSE Package Hub 15 in CVE-2018-18350 no cpe found for SUSE Package Hub 15 in CVE-2018-18349 no cpe found for SUSE Package Hub 15 in CVE-2018-18348 no cpe found for SUSE Package Hub 15 in CVE-2018-18347 no cpe found for SUSE Package Hub 15 in CVE-2018-18346 no cpe found for SUSE Package Hub 15 in CVE-2018-18345 no cpe found for SUSE Package Hub 15 in CVE-2018-18344 no cpe found for SUSE Package Hub 15 in CVE-2018-18343 no cpe found for SUSE Package Hub 15 in CVE-2018-18342 no cpe found for SUSE Package Hub 15 in CVE-2018-18341 no cpe found for SUSE Package Hub 15 in CVE-2018-18340 no cpe found for SUSE Package Hub 15 in CVE-2018-18339 no cpe found for SUSE Package Hub 15 in CVE-2018-18338 no cpe found for SUSE Package Hub 15 in CVE-2018-18337 no cpe found for SUSE Package Hub 15 in CVE-2018-18336 no cpe found for SUSE Package Hub 15 in CVE-2018-18335 skipping CVE-2018-18312 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18310 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18309 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-18281 no cpe found for SUSE Package Hub 15 in CVE-2018-18250 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18250 no cpe found for SUSE Package Hub 15 in CVE-2018-18249 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18249 no cpe found for SUSE Package Hub 15 in CVE-2018-18248 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18248 no cpe found for SUSE Package Hub 15 in CVE-2018-18247 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18247 no cpe found for SUSE Package Hub 15 in CVE-2018-18246 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18246 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-18245 skipping CVE-2018-18227 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18226 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18225 as CVE page is older than CVRF-CVE file. CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP2, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Point of Sale 12 SP2, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP1, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Module for Containers 12, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP1, but entry? CVE-2018-18074: no packages for Image SLES12-SP4-SAP-OCI-BYOS, but entry? CVE-2018-18074: no packages for Image SLES12-SP4-OCI-BYOS, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Server 12 SP1-LTSS, but entry? CVE-2018-18074: no packages for SUSE CaaS Platform 3.0, but entry? CVE-2018-18074: no packages for Image SLES12-SP4-OCI-BYOS, but entry? CVE-2018-18074: no packages for Image SLES12-SP4-SAP-OCI-BYOS, but entry? CVE-2018-18074: no packages for SUSE CaaS Platform 3.0, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP1, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP2, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Module for Containers 12, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Point of Sale 12 SP2, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Server 12 SP1-LTSS, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP1, but entry? CVE-2018-18074: no packages for Image SLES12-SP4-OCI-BYOS, but entry? CVE-2018-18074: no packages for Image SLES12-SP4-SAP-OCI-BYOS, but entry? CVE-2018-18074: no packages for SUSE CaaS Platform 3.0, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP1, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise High Availability Extension 12 SP2, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Module for Containers 12, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Point of Sale 12 SP2, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Server 12 SP1-LTSS, but entry? CVE-2018-18074: no packages for SUSE Linux Enterprise Server for SAP Applications 12 SP1, but entry? skipping CVE-2018-18066 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18065 as CVE page is older than CVRF-CVE file. skipping CVE-2018-18021 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17985 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17972 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-17956 skipping CVE-2018-17953 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-17828 skipping CVE-2018-17795 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-17581 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-17572 no cpe found for SUSE Package Hub 15 in CVE-2018-17481 no cpe found for SUSE Package Hub 15 in CVE-2018-17480 no cpe found for SUSE Package Hub 15 in CVE-2018-17479 no cpe found for SUSE Package Hub 15 in CVE-2018-17478 no cpe found for SUSE Package Hub 15 in CVE-2018-17477 no cpe found for SUSE Package Hub 15 in CVE-2018-17476 no cpe found for SUSE Package Hub 15 in CVE-2018-17475 no cpe found for SUSE Package Hub 15 in CVE-2018-17474 no cpe found for SUSE Package Hub 15 in CVE-2018-17473 no cpe found for SUSE Package Hub 15 in CVE-2018-17472 no cpe found for SUSE Package Hub 15 in CVE-2018-17471 no cpe found for SUSE Package Hub 15 in CVE-2018-17470 no cpe found for SUSE Package Hub 15 in CVE-2018-17469 no cpe found for SUSE Package Hub 15 in CVE-2018-17468 no cpe found for SUSE Package Hub 15 in CVE-2018-17467 no cpe found for SUSE Package Hub 15 in CVE-2018-17466 no cpe found for SUSE Package Hub 15 in CVE-2018-17465 no cpe found for SUSE Package Hub 15 in CVE-2018-17464 no cpe found for SUSE Package Hub 15 in CVE-2018-17463 no cpe found for SUSE Package Hub 15 in CVE-2018-17462 skipping CVE-2018-17456 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17439 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17437 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17436 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17435 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17434 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17433 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17432 skipping CVE-2018-17407 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17360 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17359 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17358 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17237 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17234 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-17233 skipping CVE-2018-17199 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17197 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17189 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17182 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-17144 no cpe found for SUSE Package Hub 15 SP5 in CVE-2018-17144 no cpe found for SUSE Package Hub 15 in CVE-2018-17141 skipping CVE-2018-17101 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17100 as CVE page is older than CVRF-CVE file. skipping CVE-2018-17095 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-17088 no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-17088 no cpe found for SUSE Package Hub 15 SP4 in CVE-2018-17076 no cpe found for SUSE Package Hub 15 SP5 in CVE-2018-17076 no cpe found for SUSE Package Hub 15 in CVE-2018-16976 skipping CVE-2018-16982 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16884 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16882 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16880 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-16876 no cpe found for SUSE Package Hub 15 in CVE-2018-16876 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-16876 skipping CVE-2018-16877 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-16875 no cpe found for SUSE Package Hub 15 in CVE-2018-16874 no cpe found for SUSE Package Hub 15 in CVE-2018-16873 skipping CVE-2018-16871 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-16859 no cpe found for SUSE Package Hub 15 in CVE-2018-16859 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-16859 skipping CVE-2018-16865 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16864 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16863 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16862 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16860 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16857 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-16855 skipping CVE-2018-16853 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16852 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16851 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16850 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16841 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-16837 no cpe found for SUSE Package Hub 15 in CVE-2018-16837 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-16837 no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-16837 skipping CVE-2018-16750 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16749 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-16658 skipping CVE-2018-16648 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-16644 skipping CVE-2018-16645 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16643 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16642 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16640 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16597 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-16587 no cpe found for SUSE Package Hub 15 in CVE-2018-16586 no cpe found for SUSE Package Hub 15 in CVE-2018-16554 no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-16554 skipping CVE-2018-16476 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16471 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16468 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-16438 skipping CVE-2018-16403 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16369 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16368 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16335 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-16328 skipping CVE-2018-16276 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-16088 no cpe found for SUSE Package Hub 15 in CVE-2018-16087 no cpe found for SUSE Package Hub 15 in CVE-2018-16086 no cpe found for SUSE Package Hub 15 in CVE-2018-16085 no cpe found for SUSE Package Hub 15 in CVE-2018-16084 no cpe found for SUSE Package Hub 15 in CVE-2018-16083 no cpe found for SUSE Package Hub 15 in CVE-2018-16082 no cpe found for SUSE Package Hub 15 in CVE-2018-16081 no cpe found for SUSE Package Hub 15 in CVE-2018-16080 no cpe found for SUSE Package Hub 15 in CVE-2018-16079 no cpe found for SUSE Package Hub 15 in CVE-2018-16078 no cpe found for SUSE Package Hub 15 in CVE-2018-16077 no cpe found for SUSE Package Hub 15 in CVE-2018-16076 no cpe found for SUSE Package Hub 15 in CVE-2018-16075 no cpe found for SUSE Package Hub 15 in CVE-2018-16074 no cpe found for SUSE Package Hub 15 in CVE-2018-16073 no cpe found for SUSE Package Hub 15 in CVE-2018-16071 no cpe found for SUSE Package Hub 15 in CVE-2018-16070 no cpe found for SUSE Package Hub 15 in CVE-2018-16069 no cpe found for SUSE Package Hub 15 in CVE-2018-16068 no cpe found for SUSE Package Hub 15 in CVE-2018-16067 no cpe found for SUSE Package Hub 15 in CVE-2018-16066 no cpe found for SUSE Package Hub 15 in CVE-2018-16065 skipping CVE-2018-16062 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16058 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16057 as CVE page is older than CVRF-CVE file. skipping CVE-2018-16056 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15864 skipping CVE-2018-15869 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15863 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15862 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15861 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15859 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15857 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15856 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15855 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15854 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15853 no cpe found for SUSE Package Hub 15 in CVE-2018-15822 no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-15727 skipping CVE-2018-15746 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15672 skipping CVE-2018-15688 as CVE page is older than CVRF-CVE file. skipping CVE-2018-15687 as CVE page is older than CVRF-CVE file. skipping CVE-2018-15686 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-15671 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15607 no cpe found for SUSE Package Hub 15 in CVE-2018-15605 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-15587 skipping CVE-2018-15594 as CVE page is older than CVRF-CVE file. skipping CVE-2018-15572 as CVE page is older than CVRF-CVE file. skipping CVE-2018-15518 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-15473 skipping CVE-2018-15471 as CVE page is older than CVRF-CVE file. skipping CVE-2018-15127 as CVE page is older than CVRF-CVE file. skipping CVE-2018-15126 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-14734 skipping CVE-2018-14780 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14779 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14682 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14681 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14680 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14679 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-14663 skipping CVE-2018-14665 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-14644 no cpe found for SUSE Package Hub 15 in CVE-2018-14626 skipping CVE-2018-14634 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14633 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14629 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14628 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14625 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-14617 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14600 skipping CVE-2018-14613 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14612 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14611 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14610 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14609 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14599 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14598 no cpe found for SUSE Package Hub 15 in CVE-2018-14593 no cpe found for SUSE Package Hub 15 in CVE-2018-14574 skipping CVE-2018-14567 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-14526 no cpe found for SUSE Package Hub 15 in CVE-2018-14523 no cpe found for SUSE Package Hub 15 in CVE-2018-14522 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14498 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14460 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-14447 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14437 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14436 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14435 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14434 skipping CVE-2018-14424 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14404 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14370 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14369 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14368 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14367 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-14355 skipping CVE-2018-14348 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14344 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14343 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14342 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14341 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14340 as CVE page is older than CVRF-CVE file. skipping CVE-2018-14339 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-14332 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-14332 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-13988 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13876 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13874 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13873 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13872 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13871 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13870 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13869 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13868 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-13866 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-13458 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-13457 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-13441 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-13440 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-13406 skipping CVE-2018-13405 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-13305 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-13305 no cpe found for SUSE Package Hub 15 in CVE-2018-13300 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-13153 skipping CVE-2018-13094 as CVE page is older than CVRF-CVE file. skipping CVE-2018-13093 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-13053 skipping CVE-2018-12934 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12930 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-12910 skipping CVE-2018-12928 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12911 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-12896 skipping CVE-2018-12904 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12900 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12699 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-12600 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-12599 no cpe found for SUSE Package Hub 15 in CVE-2018-12558 no cpe found for SUSE Package Hub 15 in CVE-2018-12551 no cpe found for SUSE Package Hub 15 in CVE-2018-12550 no cpe found for SUSE Package Hub 15 in CVE-2018-12546 skipping CVE-2018-12539 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-12495 no cpe found for SUSE Package Hub 15 in CVE-2018-12476 no cpe found for SUSE Package Hub 15 in CVE-2018-12474 no cpe found for SUSE Package Hub 15 in CVE-2018-12473 skipping CVE-2018-12437 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12434 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12433 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-12366 no cpe found for SUSE Package Hub 15 in CVE-2018-12365 no cpe found for SUSE Package Hub 15 in CVE-2018-12364 no cpe found for SUSE Package Hub 15 in CVE-2018-12363 no cpe found for SUSE Package Hub 15 in CVE-2018-12362 no cpe found for SUSE Package Hub 15 in CVE-2018-12360 no cpe found for SUSE Package Hub 15 in CVE-2018-12359 skipping CVE-2018-12327 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12294 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12293 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12233 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12232 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12207 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12181 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12180 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12178 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12130 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12127 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12126 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools 15 SP1 in CVE-2018-12099 skipping CVE-2018-12086 as CVE page is older than CVRF-CVE file. skipping CVE-2018-12085 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-12021 skipping CVE-2018-12020 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-12015 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11813 skipping CVE-2018-11784 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11782 skipping CVE-2018-11761 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-11759 skipping CVE-2018-11713 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11712 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11685 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11684 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11683 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11656 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11646 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11645 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11577 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-11531 no cpe found for SUSE Package Hub 15 in CVE-2018-11499 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-11499 no cpe found for SUSE Package Hub 15 in CVE-2018-11468 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11439 skipping CVE-2018-11440 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11412 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-11396 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-11396 skipping CVE-2018-11362 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11361 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11360 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11359 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11358 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11357 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11356 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11355 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11354 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-11243 skipping CVE-2018-11237 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11236 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11235 as CVE page is older than CVRF-CVE file. skipping CVE-2018-11233 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11214 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-11213 skipping CVE-2018-11212 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11207 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11206 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11205 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11204 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11203 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 no cpe found for SUSE Linux Enterprise Module for HPC 12 SP2 in CVE-2018-11202 skipping CVE-2018-10963 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-10940 skipping CVE-2018-10938 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10933 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10931 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10925 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10919 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10918 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10915 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10906 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10902 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10893 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10882 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10880 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-10875 no cpe found for SUSE Package Hub 15 in CVE-2018-10875 no cpe found for SUSE Package Hub 15 SP3 in CVE-2018-10875 CVE-2018-10874: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2018-10874: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2018-10874: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-10874 CVE-2018-10874: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2018-10874: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2018-10874: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2018-10874: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2018-10874: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2018-10874: no packages for SUSE Manager Tools for SLE Micro 5, but entry? skipping CVE-2018-10873 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10858 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-10855 no cpe found for SUSE Package Hub 15 in CVE-2018-10855 skipping CVE-2018-10853 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-10851 skipping CVE-2018-10846 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10845 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10844 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10805 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10804 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-10772 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10768 skipping CVE-2018-10767 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10733 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10689 skipping CVE-2018-10675 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-10547 skipping CVE-2018-10540 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10539 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10538 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10537 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10536 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10535 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10534 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10393 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10392 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10373 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10372 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10360 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10323 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10322 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10244 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10242 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10194 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10177 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10124 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10087 as CVE page is older than CVRF-CVE file. skipping CVE-2018-10021 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-9568 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-9516 skipping CVE-2018-9274 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9273 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9272 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9271 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9270 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9269 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9268 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9267 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9266 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9265 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9264 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9263 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9262 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9261 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9260 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9259 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9258 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9257 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9256 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9251 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-9133 skipping CVE-2018-9138 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9135 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-8977 skipping CVE-2018-9055 as CVE page is older than CVRF-CVE file. skipping CVE-2018-9018 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-8976 skipping CVE-2018-8960 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8945 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8905 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-8822 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8800 skipping CVE-2018-8804 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8799 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8798 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8797 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8796 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8795 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8794 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8793 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8792 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-8791 skipping CVE-2018-8781 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8769 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8740 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2018-8704 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/8xxxx/CVE-2018-8704.json:No such file or directory No V5 entry found for CVE-2018-8523 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/8xxxx/CVE-2018-8523.json:No such file or directory skipping CVE-2018-8107 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8106 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8105 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8104 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8103 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8102 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8101 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8100 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8088 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8048 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8034 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8014 as CVE page is older than CVRF-CVE file. skipping CVE-2018-8011 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7995 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7858 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7757 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7750 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7738 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-7730 skipping CVE-2018-7685 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-7584 skipping CVE-2018-7643 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7642 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-7566 skipping CVE-2018-7570 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7569 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7568 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7544 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-7492 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-7485 skipping CVE-2018-7480 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7470 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7456 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7455 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7454 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7453 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7452 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7443 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-7409 skipping CVE-2018-7254 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7225 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-7187 skipping CVE-2018-7208 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7191 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7175 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7174 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7173 as CVE page is older than CVRF-CVE file. skipping CVE-2018-7169 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-6952 skipping CVE-2018-6954 as CVE page is older than CVRF-CVE file. skipping CVE-2018-6927 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-6913 skipping CVE-2018-6872 as CVE page is older than CVRF-CVE file. skipping CVE-2018-6836 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-6798 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-6790 no cpe found for SUSE Package Hub 15 SP1 in CVE-2018-6789 no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-6789 skipping CVE-2018-6764 as CVE page is older than CVRF-CVE file. skipping CVE-2018-6759 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2018-6612 skipping CVE-2018-6616 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-6574 no cpe found for SUSE Package Hub 15 in CVE-2018-6556 skipping CVE-2018-6555 as CVE page is older than CVRF-CVE file. skipping CVE-2018-6554 as CVE page is older than CVRF-CVE file. skipping CVE-2018-6543 as CVE page is older than CVRF-CVE file. skipping CVE-2018-6467 as CVE page is older than CVRF-CVE file. skipping CVE-2018-6405 as CVE page is older than CVRF-CVE file. skipping CVE-2018-6323 as CVE page is older than CVRF-CVE file. skipping CVE-2018-6307 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-5814 skipping CVE-2018-5803 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5784 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2018-5772 skipping CVE-2018-5748 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5744 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5738 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5737 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5736 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5733 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5732 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5730 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5729 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-5712 skipping CVE-2018-5703 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5685 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5407 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5391 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-5379 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-5345 skipping CVE-2018-5357 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5344 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5336 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5335 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5334 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5333 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5332 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-5188 no cpe found for SUSE Package Hub 15 in CVE-2018-5179 no cpe found for SUSE Package Hub 15 in CVE-2018-5156 skipping CVE-2018-5147 as CVE page is older than CVRF-CVE file. skipping CVE-2018-5146 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4700 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4464 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4443 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4442 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4441 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4438 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4437 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4416 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4392 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4386 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4382 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4378 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4376 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4375 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4373 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4372 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4361 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4359 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4358 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4345 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4328 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4323 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4319 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4318 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4317 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4316 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4315 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4314 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4312 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4311 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4309 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4306 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4300 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4299 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4284 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4278 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4273 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4272 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4271 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4270 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4267 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4266 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4265 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4264 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4263 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4262 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4261 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4246 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4233 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4232 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4222 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4218 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4214 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4213 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4212 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4210 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4209 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4208 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4207 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4204 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4200 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4199 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4197 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4191 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4190 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-4022 skipping CVE-2018-4165 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4163 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4162 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4161 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4146 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4133 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4129 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4128 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4127 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4125 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4122 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4121 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4120 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4119 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4118 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4117 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4114 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4113 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4101 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4096 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4089 as CVE page is older than CVRF-CVE file. skipping CVE-2018-4088 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2018-4013 no cpe found for SUSE Package Hub 15 in CVE-2018-3977 no cpe found for SUSE Package Hub 15 in CVE-2018-3839 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2018-3817 no cpe found for SUSE Package Hub 15 in CVE-2018-3780 skipping CVE-2018-3760 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3741 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-3665 skipping CVE-2018-3646 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-3620 skipping CVE-2018-3639 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3630 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2018-3613 skipping CVE-2018-3284 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3282 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3277 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3251 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3200 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3185 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3183 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3180 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3174 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3173 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3169 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3162 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3157 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3156 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3150 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3149 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3143 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3139 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3136 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3066 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3064 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3063 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3060 as CVE page is older than CVRF-CVE file. skipping CVE-2018-3058 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2973 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2972 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2964 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2952 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2940 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2938 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2826 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2825 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2819 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2817 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2815 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2814 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2813 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2810 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2800 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2799 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2798 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2797 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2796 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2795 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2794 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2790 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2787 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2786 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2784 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2782 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2781 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2777 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2771 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2767 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2766 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2761 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2759 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2755 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2668 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2665 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2640 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2622 as CVE page is older than CVRF-CVE file. skipping CVE-2018-2612 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2018-1537 / /home/securitybot/prod/cve-database/cvelistV5/cves/2018/1xxxx/CVE-2018-1537.json:No such file or directory skipping CVE-2018-2562 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1890 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1656 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1517 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1336 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1312 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1311 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1305 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1303 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1302 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1301 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1283 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-1130 skipping CVE-2018-1140 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1139 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1126 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1125 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1124 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1123 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1122 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1115 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1108 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1095 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1094 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1092 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1084 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2018-1068 skipping CVE-2018-1065 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1064 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1059 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1058 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1057 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1052 as CVE page is older than CVRF-CVE file. skipping CVE-2018-1050 as CVE page is older than CVRF-CVE file. skipping CVE-2018-0739 as CVE page is older than CVRF-CVE file. skipping CVE-2018-0737 as CVE page is older than CVRF-CVE file. skipping CVE-2018-0735 as CVE page is older than CVRF-CVE file. skipping CVE-2018-0734 as CVE page is older than CVRF-CVE file. skipping CVE-2018-0732 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000476 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000469 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000456 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-1000433 skipping CVE-2017-1000445 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000407 skipping CVE-2017-1000408 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000380 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-1000369 no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-1000369 skipping CVE-2017-1000371 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000370 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000364 skipping CVE-2017-1000365 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000363 skipping CVE-2017-1000257 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000256 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000253 skipping CVE-2017-1000254 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000251 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-1000128 skipping CVE-2017-1000122 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-1000112 skipping CVE-2017-1000101 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000100 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000099 as CVE page is older than CVRF-CVE file. skipping CVE-2017-1000082 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-1000050 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18922 skipping CVE-2017-18926 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18640 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-18635 skipping CVE-2017-18595 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18551 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18550 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18549 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18509 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18379 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2017-18359 skipping CVE-2017-18360 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18344 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2017-18342.xml 2024-10-23 02:48:38.725907000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2017-18342.xml.new 2024-10-29 02:45:19.691470000 +0100 @@ -14,13 +14,13 @@ 1 - 127 - 2024-10-23T00:48:38Z + 128 + 2024-10-29T01:45:17Z current 2021-05-30T14:05:44Z - 2024-10-23T00:48:38Z + 2024-10-29T01:45:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -195,6 +195,11 @@ Image SLES12-SP5-EC2-SAP-On-Demand + + + Image SLES12-SP5-GCE-BYOS + + Image SLES12-SP5-GCE-SAP-BYOS @@ -1107,6 +1112,9 @@ python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand + + python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-BYOS + python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS @@ -1550,6 +1558,7 @@ Image SLES12-SP5-EC2-On-Demand:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-EC2-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-EC2-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1 + Image SLES12-SP5-GCE-BYOS:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-GCE-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-GCE-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-OCI-BYOS-BYOS:python3-PyYAML-5.1.2-3.3.1 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18273 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18271 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18267 skipping CVE-2017-18270 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18269 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18261 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18258 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18257 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18255 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18254 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18252 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18251 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18250 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18249 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18238 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18236 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18234 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18233 skipping CVE-2017-18224 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18222 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18221 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18218 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18211 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18209 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18208 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18207 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18204 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18203 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18201 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18199 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18198 skipping CVE-2017-18193 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-18189 skipping CVE-2017-18174 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18079 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18078 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18075 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18029 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18028 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18027 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18017 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18013 as CVE page is older than CVRF-CVE file. skipping CVE-2017-18008 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17975 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17973 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17935 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17934 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17914 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17887 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17885 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17884 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17882 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17879 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-17805 skipping CVE-2017-17807 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17806 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17741 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17740 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17725 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17682 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17681 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17680 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2017-17555 no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-17555 skipping CVE-2017-17558 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17504 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17450 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17121 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17095 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17087 as CVE page is older than CVRF-CVE file. skipping CVE-2017-17053 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16997 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-16944 no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-16944 no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-16943 no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-16943 skipping CVE-2017-16939 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16932 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16914 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16913 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16912 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16911 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16879 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-16844 skipping CVE-2017-16832 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16831 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16830 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16829 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16828 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16827 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16826 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16669 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16650 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16649 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16648 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16644 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16643 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16611 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-16544 skipping CVE-2017-16546 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16545 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-16537 skipping CVE-2017-16538 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-16536 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-16533 skipping CVE-2017-16535 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16534 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16532 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16531 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16530 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16529 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16528 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16527 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16525 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16353 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16352 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16340 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16232 as CVE page is older than CVRF-CVE file. skipping CVE-2017-16011 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15996 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15951 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15939 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15938 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15930 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15908 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-15874 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-15873 skipping CVE-2017-15868 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15865 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15715 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15710 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15706 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15652 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15649 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15565 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15537 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2017-15430 skipping CVE-2017-15365 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15299 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15298 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15281 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15277 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15275 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15274 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15268 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15265 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15218 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15217 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-15139 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15131 skipping CVE-2017-15130 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15126 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15112 skipping CVE-2017-15118 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15116 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15115 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15111 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15101 skipping CVE-2017-15102 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15099 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15098 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15088 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15042 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-15041 skipping CVE-2017-15038 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15023 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15017 as CVE page is older than CVRF-CVE file. skipping CVE-2017-15016 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14997 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14989 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14988 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14980 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14977 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14976 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14975 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14928 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14867 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14858 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14798 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14746 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14739 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14733 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14696 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14695 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14682 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14649 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14633 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14632 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14617 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14607 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14531 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14520 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14519 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14518 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14517 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14505 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14503 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14502 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14501 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14497 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-14489 skipping CVE-2017-14343 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14342 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14341 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14340 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14325 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14314 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14249 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14230 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14224 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14175 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14174 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14173 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14172 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14167 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14166 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14160 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14140 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14139 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14138 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14121 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14106 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14103 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14062 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14060 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14051 as CVE page is older than CVRF-CVE file. skipping CVE-2017-14042 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13885 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13884 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13771 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13769 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13768 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13767 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13766 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13765 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13744 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13743 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13742 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13741 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13740 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13739 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13738 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13734 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13733 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13732 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13731 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13730 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13729 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13728 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13721 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13715 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13711 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13694 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13693 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13673 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-13305 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-13215 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-13167 skipping CVE-2017-13166 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13147 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13142 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13141 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13134 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13131 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13088 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13087 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13086 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13084 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13082 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13081 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13080 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13079 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13078 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13077 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13069 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13062 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13061 as CVE page is older than CVRF-CVE file. skipping CVE-2017-13059 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12983 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12944 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12942 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12935 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-12911 skipping CVE-2017-12883 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12880 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12837 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12836 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12814 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12806 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12805 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12791 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-12762 skipping CVE-2017-12693 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12692 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12691 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12676 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12674 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12673 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12671 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12669 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12668 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-12652 skipping CVE-2017-12666 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12665 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12664 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12663 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12662 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12654 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12644 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12643 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12642 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12641 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12640 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12618 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12617 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12615 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12588 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12587 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12566 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12565 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12563 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2017-12482 no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-12482 no cpe found for SUSE Package Hub 15 in CVE-2017-12481 no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-12481 skipping CVE-2017-12447 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12435 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12432 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12430 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12429 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12427 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12418 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-12190 skipping CVE-2017-12192 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12188 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12187 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12176 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12166 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12163 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12151 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12150 as CVE page is older than CVRF-CVE file. skipping CVE-2017-12140 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11754 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2017-11747 skipping CVE-2017-11752 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11751 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11750 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11642 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11640 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11639 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11638 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11613 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11600 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-11591 skipping CVE-2017-11548 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11539 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11537 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11535 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11533 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11532 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11531 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11530 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11528 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11526 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11525 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11524 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11523 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11505 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-11468 skipping CVE-2017-11478 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11473 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11472 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11462 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11455 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11450 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11449 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11448 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11411 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11410 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11409 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11408 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11407 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11406 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11368 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11360 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11188 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11185 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11176 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11170 as CVE page is older than CVRF-CVE file. skipping CVE-2017-11166 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-11104 no cpe found for SUSE Package Hub 15 SP2 in CVE-2017-11104 skipping CVE-2017-11103 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10995 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10989 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10988 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10987 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10986 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10985 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10984 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10983 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10982 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10981 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10980 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10979 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10978 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10971 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10915 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10911 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10862 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10810 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10807 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10790 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10700 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10661 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10388 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10384 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10379 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10378 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10365 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10357 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10356 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10355 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10350 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10349 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10348 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10347 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10346 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10345 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10320 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10295 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10286 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10285 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10281 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10274 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10268 as CVE page is older than CVRF-CVE file. skipping CVE-2017-10115 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9986 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9985 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9984 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2017-9951 skipping CVE-2017-9936 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9935 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9865 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9832 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9831 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9814 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9798 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9776 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9775 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9766 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9617 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9614 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9524 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9500 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9445 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9409 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9408 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9407 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9406 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9405 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9404 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9403 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP1 in CVE-2017-9271 no cpe found for SUSE Linux Enterprise Installer Updates 15 SP2 in CVE-2017-9271 skipping CVE-2017-9269 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9262 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9261 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9242 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9227 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9224 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2017-9190 no cpe found for SUSE Package Hub 15 SP3 in CVE-2017-9182 skipping CVE-2017-9150 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9128 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9127 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9126 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9125 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9124 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9123 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9122 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9083 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9077 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9076 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9075 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9074 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9023 as CVE page is older than CVRF-CVE file. skipping CVE-2017-9022 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2017-8934 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-8924 skipping CVE-2017-8925 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8890 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8872 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8831 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8824 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8816 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8813 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8797 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8786 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-8761 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-8452 skipping CVE-2017-8386 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8380 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8379 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-8373 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-8372 skipping CVE-2017-8284 as CVE page is older than CVRF-CVE file. skipping CVE-2017-8106 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7982 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7957 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7889 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7874 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7843 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7778 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7777 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7776 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7775 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7774 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7773 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7772 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7771 skipping CVE-2017-7645 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7618 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7616 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7613 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7612 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7611 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7610 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7608 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7607 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7602 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7601 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7600 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7599 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7598 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7597 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7596 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7595 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7594 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7593 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7592 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7586 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7562 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-7557 skipping CVE-2017-7555 as CVE page is older than CVRF-CVE file. CVE-2017-7550: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2017-7550: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2017-7550: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2017-7550: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2017-7550: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2017-7550: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2017-7550: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2017-7550: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2017-7550: no packages for SUSE Manager Tools for SLE Micro 5, but entry? skipping CVE-2017-7542 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7541 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7538 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7533 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7526 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7522 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7521 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7520 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7518 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7511 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7508 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7495 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7494 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7493 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-7488 skipping CVE-2017-7487 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2017-7481 skipping CVE-2017-7482 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7479 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7478 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7475 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7472 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7471 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7470 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2017-7466 skipping CVE-2017-7436 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7435 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2017-7418 no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-7418 skipping CVE-2017-7374 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7346 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7308 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7294 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7273 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7261 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7187 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7184 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7165 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7161 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7160 as CVE page is older than CVRF-CVE file. skipping CVE-2017-7153 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6951 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6888 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6874 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6852 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6839 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6838 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6837 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6836 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6835 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6834 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6833 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6832 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6831 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6830 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6829 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6828 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6827 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6590 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-6519 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2017-6512 skipping CVE-2017-6507 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6468 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6467 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6464 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6463 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6462 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6460 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6458 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6451 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6440 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6353 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6348 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6347 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6346 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6345 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6214 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6074 as CVE page is older than CVRF-CVE file. skipping CVE-2017-6058 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-6011 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-6010 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-6009 skipping CVE-2017-6001 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-5986 skipping CVE-2017-5972 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5970 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5967 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5950 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2017-5934 skipping CVE-2017-5932 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5897 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5857 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5848 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5845 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5843 skipping CVE-2017-5844 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5841 skipping CVE-2017-5842 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5840 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2017-5754 skipping CVE-2017-5839 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5838 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5837 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5836 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5835 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5834 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5753 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5735 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5734 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5733 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5732 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5731 skipping CVE-2017-5715 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5669 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5664 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5648 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5647 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5601 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5578 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5577 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5576 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5552 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5551 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5549 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5545 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5525 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5333 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5332 skipping CVE-2017-5225 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-5208 skipping CVE-2017-5209 as CVE page is older than CVRF-CVE file. skipping CVE-2017-5029 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-4967 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2017-4965 skipping CVE-2017-3738 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3737 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3736 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3735 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3732 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3731 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3653 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3652 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3651 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3650 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3649 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3648 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3647 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3646 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3645 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3644 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3643 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3642 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3641 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3640 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3639 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3638 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3637 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3636 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3634 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3633 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3617 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3616 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3615 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3614 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3613 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3612 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3611 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3610 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3609 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3608 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3607 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3606 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3605 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3604 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3600 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3599 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3529 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3467 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3465 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3464 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3463 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3462 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3461 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3460 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3459 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3458 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3457 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3456 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3454 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3453 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3452 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3450 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3331 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3329 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3320 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3319 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3318 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3317 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3313 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3312 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3309 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3308 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3305 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3302 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3291 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3289 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3273 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3272 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3265 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3262 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3261 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3260 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3259 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3258 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3257 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3256 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3253 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3252 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3251 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3244 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3243 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3241 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3238 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3231 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3145 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3143 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3142 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3141 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3140 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3139 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3138 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3137 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3136 as CVE page is older than CVRF-CVE file. skipping CVE-2017-3135 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2017-2808 no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-2808 no cpe found for SUSE Package Hub 15 in CVE-2017-2807 no cpe found for SUSE Package Hub 15 SP1 in CVE-2017-2807 skipping CVE-2017-2671 as CVE page is older than CVRF-CVE file. skipping CVE-2017-2647 as CVE page is older than CVRF-CVE file. skipping CVE-2017-2636 as CVE page is older than CVRF-CVE file. skipping CVE-2017-2635 as CVE page is older than CVRF-CVE file. skipping CVE-2017-2630 as CVE page is older than CVRF-CVE file. skipping CVE-2017-2629 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-2626 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-2625 skipping CVE-2017-2619 as CVE page is older than CVRF-CVE file. skipping CVE-2017-2596 as CVE page is older than CVRF-CVE file. skipping CVE-2017-2584 as CVE page is older than CVRF-CVE file. skipping CVE-2017-2583 as CVE page is older than CVRF-CVE file. skipping CVE-2017-2538 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2017-1809 / /home/securitybot/prod/cve-database/cvelistV5/cves/2017/1xxxx/CVE-2017-1809.json:No such file or directory skipping CVE-2017-1376 as CVE page is older than CVRF-CVE file. skipping CVE-2017-0861 as CVE page is older than CVRF-CVE file. skipping CVE-2017-0663 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-0553 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2017-0393 skipping CVE-2017-0386 as CVE page is older than CVRF-CVE file. no entry found for CVE-2016-1000212 / /home/securitybot/prod/cve-database/cvelist/2016/1000xxxx/CVE-2016-1000212.json:No such file or directory No V5 entry found for CVE-2016-1000212 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/1000xxxx/CVE-2016-1000212.json:No such file or directory skipping CVE-2016-1000110 as CVE page is older than CVRF-CVE file. skipping CVE-2016-20022 as CVE page is older than CVRF-CVE file. skipping CVE-2016-20013 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2016-10937 skipping CVE-2016-10905 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10741 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2016-10516 skipping CVE-2016-10371 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-10277 skipping CVE-2016-10272 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10271 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10270 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10269 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10268 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10267 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10266 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10255 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10254 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-10245 skipping CVE-2016-10229 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10228 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10218 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10208 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-10199 skipping CVE-2016-10200 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-10198 skipping CVE-2016-10197 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10195 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10172 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10171 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10170 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10169 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-10164 skipping CVE-2016-10156 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10147 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10095 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10094 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10093 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10092 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10088 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10044 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10028 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10012 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10011 as CVE page is older than CVRF-CVE file. skipping CVE-2016-10009 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2016-9971 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/9xxxx/CVE-2016-9971.json:No such file or directory skipping CVE-2016-9942 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9941 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9918 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9917 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9888 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9811 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9810 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-9806 skipping CVE-2016-9808 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9807 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9803 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9802 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-9793 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-9793 skipping CVE-2016-9798 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9797 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9794 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9756 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-9685 skipping CVE-2016-9639 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9636 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9635 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9634 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9605 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9604 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9602 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9597 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9596 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9594 as CVE page is older than CVRF-CVE file. CVE-2016-9587: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2016-9587: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2016-9587: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2016-9587: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2016-9587: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2016-9587: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2016-9587: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2016-9587: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2016-9587: no packages for SUSE Manager Tools for SLE Micro 5, but entry? skipping CVE-2016-9588 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9578 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9577 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9576 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2016-9566 skipping CVE-2016-9555 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-9446 skipping CVE-2016-9444 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9396 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9395 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9372 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9313 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9311 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9310 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9191 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9178 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9147 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9131 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9106 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9105 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9104 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9103 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9102 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9084 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9083 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9082 as CVE page is older than CVRF-CVE file. skipping CVE-2016-9074 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2016-9015 skipping CVE-2016-9042 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2016-9013 skipping CVE-2016-8888 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8864 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8858 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8745 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8743 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8740 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-8706 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-8705 no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2016-8705 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-8704 skipping CVE-2016-8689 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8688 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8687 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8684 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8683 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8682 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8677 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8668 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8666 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8658 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8655 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8650 as CVE page is older than CVRF-CVE file. CVE-2016-8647: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2016-8647: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2016-8647: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2016-8647: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2016-8647: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2016-8647: no packages for SUSE Manager Tools for SLE Micro 5, but entry? CVE-2016-8647: no packages for SUSE Linux Enterprise Module for Package Hub 15 SP5, but entry? CVE-2016-8647: no packages for SUSE Manager Tools Beta for SLE Micro 5, but entry? CVE-2016-8647: no packages for SUSE Manager Tools for SLE Micro 5, but entry? skipping CVE-2016-8646 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8645 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-8638 skipping CVE-2016-8637 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2016-8628 skipping CVE-2016-8633 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8632 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8630 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8624 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8623 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8622 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8621 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8620 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8619 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8618 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8617 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8616 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Manager Tools for SLE Micro 5 in CVE-2016-8614 skipping CVE-2016-8610 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP4 in CVE-2016-8605 skipping CVE-2016-8602 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8578 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8577 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-8405 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-8399 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-8399 skipping CVE-2016-8331 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8328 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8327 as CVE page is older than CVRF-CVE file. skipping CVE-2016-8283 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7997 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7996 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7994 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7948 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7947 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-7914 skipping CVE-2016-7916 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7915 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7913 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-7911 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-7911 skipping CVE-2016-7910 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7907 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7800 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7799 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7797 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7567 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7540 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7539 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7538 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7537 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7535 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7534 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7533 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7532 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7531 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7529 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7528 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7527 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7526 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7525 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7524 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7523 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7522 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7521 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7520 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7519 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7518 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7517 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7516 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7515 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7514 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7513 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2016-7498 skipping CVE-2016-7466 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-7425 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-7425 skipping CVE-2016-7440 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7434 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7433 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7431 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7429 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7428 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7427 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7426 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7423 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7422 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7421 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7415 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7170 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7167 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7166 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7162 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7161 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7157 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7156 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7117 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7101 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7097 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2016-7069 skipping CVE-2016-7056 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7055 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-7050 skipping CVE-2016-7052 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7042 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7039 as CVE page is older than CVRF-CVE file. skipping CVE-2016-7035 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-6893 skipping CVE-2016-6855 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6828 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-6814 skipping CVE-2016-6816 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6796 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6787 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6786 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6664 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6663 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6662 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2016-6583 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/6xxxx/CVE-2016-6583.json:No such file or directory No V5 entry found for CVE-2016-6524 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/6xxxx/CVE-2016-6524.json:No such file or directory skipping CVE-2016-6515 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6490 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6480 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6352 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6329 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6327 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6323 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6306 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2016-6301 skipping CVE-2016-6304 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6303 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6302 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6250 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6223 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6213 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2016-6209 no cpe found for SUSE Package Hub 15 SP2 in CVE-2016-6209 skipping CVE-2016-6207 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6198 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6197 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6185 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6170 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6163 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6153 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6136 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6130 as CVE page is older than CVRF-CVE file. skipping CVE-2016-6128 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5844 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-5829 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-5829 skipping CVE-2016-5842 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5841 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5828 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5766 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5759 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5735 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5725 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5699 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5696 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5691 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5690 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5689 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5688 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5687 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5636 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5630 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5629 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5626 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5624 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5612 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5597 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5584 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5582 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5573 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5568 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5556 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5554 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5552 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5549 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5548 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5547 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5546 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-5542 skipping CVE-2016-5507 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5440 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5418 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5417 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5412 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5389 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5387 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5384 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5361 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5320 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5318 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5317 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5316 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5314 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-5243 skipping CVE-2016-5244 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5195 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5104 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2016-5100 skipping CVE-2016-5018 as CVE page is older than CVRF-CVE file. skipping CVE-2016-5011 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-5003 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-4994 skipping CVE-2016-4998 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4997 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4979 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4975 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4964 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4957 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4956 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4955 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4954 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4953 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4913 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-4805 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-4805 skipping CVE-2016-4859 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4858 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4857 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4856 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4809 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4794 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4738 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4658 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4624 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4622 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4612 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4606 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4591 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4590 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-4580 skipping CVE-2016-4578 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4569 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4568 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4565 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4564 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4563 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4562 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4490 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4489 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4488 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4487 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4486 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4485 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4483 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4482 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4470 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4440 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4429 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4347 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4343 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4302 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4301 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4300 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4070 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4049 as CVE page is older than CVRF-CVE file. skipping CVE-2016-4008 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3991 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3990 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3951 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3945 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2016-3822 no cpe found for SUSE Package Hub 15 SP2 in CVE-2016-3822 skipping CVE-2016-3841 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3713 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-3707 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3707 skipping CVE-2016-3706 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3705 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3689 skipping CVE-2016-3695 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3672 skipping CVE-2016-3674 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3632 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3627 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3623 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3616 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3615 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3598 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3521 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3511 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3492 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3477 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3473 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3461 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3449 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3443 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3427 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3426 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3425 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3422 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3189 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3186 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3182 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3181 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3156 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-3140 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3140 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-3136 skipping CVE-2016-3139 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3138 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3137 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3134 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3120 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3119 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3092 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3075 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3070 as CVE page is older than CVRF-CVE file. skipping CVE-2016-3065 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2016-2915 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/2xxxx/CVE-2016-2915.json:No such file or directory skipping CVE-2016-3044 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2851 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2847 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2782 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2779 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2776 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2775 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2549 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2548 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2547 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2546 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2545 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2544 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2543 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2016-2533 skipping CVE-2016-2519 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2518 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2517 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2516 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2391 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2384 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2381 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2016-2339 skipping CVE-2016-2338 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2324 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2318 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2315 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2271 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2270 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2193 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-2186 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-2186 skipping CVE-2016-2188 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2187 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-2185 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-2185 skipping CVE-2016-2184 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2183 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2182 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2181 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2180 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2179 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2178 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2177 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2176 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2016-2148 skipping CVE-2016-2161 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2150 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2016-2147 skipping CVE-2016-2143 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2126 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2125 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2123 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2119 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2118 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2115 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2113 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2112 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2111 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2110 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2109 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2107 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2106 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2105 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2104 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2098 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2088 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-2053 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-2053 skipping CVE-2016-2069 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2047 as CVE page is older than CVRF-CVE file. skipping CVE-2016-2037 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1938 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1937 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1924 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1923 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1907 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1866 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1857 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1856 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1840 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1838 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1837 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1836 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1835 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1834 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1833 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1762 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2016-1604 / /home/securitybot/prod/cve-database/cvelistV5/cves/2016/1xxxx/CVE-2016-1604.json:No such file or directory skipping CVE-2016-1601 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1583 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1575 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1551 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1550 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1548 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1547 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1546 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1544 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1541 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1286 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1285 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1248 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1237 as CVE page is older than CVRF-CVE file. skipping CVE-2016-1234 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0823 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0821 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0800 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0799 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0798 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0797 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0787 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0777 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0772 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0771 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0764 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0763 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0758 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0755 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2016-0752 no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2016-0751 skipping CVE-2016-0749 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0739 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0736 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2016-0723 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2016-0723 skipping CVE-2016-0714 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-0704 skipping CVE-2016-0705 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2016-0703 skipping CVE-2016-0702 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0701 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0695 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0687 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0686 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0668 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0667 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0666 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0665 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0663 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0662 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0661 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0659 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0658 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0657 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0656 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0655 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0654 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0653 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0652 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0651 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0650 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0649 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0648 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0647 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0646 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0644 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0643 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0642 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0641 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0640 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0639 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0616 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0611 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0610 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0609 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0608 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0607 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0606 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0605 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0602 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0601 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0600 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0599 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0598 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0597 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0596 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0595 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0594 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0592 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0546 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0505 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0504 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0503 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0502 as CVE page is older than CVRF-CVE file. skipping CVE-2016-0495 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-1142857 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2015-20107 skipping CVE-2015-20109 as CVE page is older than CVRF-CVE file. skipping CVE-2015-10082 as CVE page is older than CVRF-CVE file. no entry found for CVE-2015-9679 / /home/securitybot/prod/cve-database/cvelist/2015/9xxxx/CVE-2015-9679.json:No such file or directory No V5 entry found for CVE-2015-9679 / /home/securitybot/prod/cve-database/cvelistV5/cves/2015/9xxxx/CVE-2015-9679.json:No such file or directory no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2015-9543 skipping CVE-2015-9541 as CVE page is older than CVRF-CVE file. skipping CVE-2015-9289 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2015-9275 no cpe found for SUSE Package Hub 15 SP1 in CVE-2015-9275 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-9262 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2015-9261 skipping CVE-2015-9105 as CVE page is older than CVRF-CVE file. skipping CVE-2015-9104 as CVE page is older than CVRF-CVE file. skipping CVE-2015-9019 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8985 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8983 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8982 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8970 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8964 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8964 skipping CVE-2015-8963 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8962 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8956 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8956 skipping CVE-2015-8959 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8958 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8957 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8955 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8953 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8952 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8950 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8935 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8934 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8933 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8932 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8931 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8930 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8929 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8928 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8927 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8926 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8925 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8924 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8923 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8922 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8921 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8920 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8919 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8918 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8917 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8916 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8915 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8903 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8902 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8901 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8900 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8898 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8897 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8896 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8895 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8894 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8876 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8853 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8845 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8844 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8839 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8830 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8816 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8812 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8785 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8784 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8783 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8782 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8781 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8779 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8778 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8777 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8776 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8767 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8733 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8732 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8731 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8730 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8729 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8728 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8727 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8726 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8725 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8724 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8723 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8722 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8721 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8720 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8719 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8718 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8717 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8716 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8715 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8714 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8713 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8712 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8711 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8710 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8709 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8705 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8704 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8683 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8668 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8665 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8660 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8631 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8630 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8629 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8605 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8575 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8569 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8552 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8552 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8551 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8551 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-8550 no cpe found for SUSE Linux Enterprise Real Time 12 SP1 in CVE-2015-8550 skipping CVE-2015-8543 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8539 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8467 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8461 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8395 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8394 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8393 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8392 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8391 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8390 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8389 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8388 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8387 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8386 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8385 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8384 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8383 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8382 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8381 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8374 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8325 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8324 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8317 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8242 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8241 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-8234 skipping CVE-2015-8215 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8158 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8140 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8139 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8138 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8104 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8035 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8025 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8023 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8019 as CVE page is older than CVRF-CVE file. skipping CVE-2015-8000 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7995 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7990 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7981 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7979 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7978 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7977 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7976 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7975 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7974 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7973 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7942 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7941 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7872 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7871 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7855 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7854 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7853 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7852 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7851 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7850 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7849 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7848 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7833 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7830 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7810 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7799 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7744 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7705 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7704 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7703 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7702 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7701 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7692 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7691 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7674 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7673 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7613 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2015-7577 skipping CVE-2015-7580 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7579 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7578 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2015-7576 skipping CVE-2015-7575 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7566 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7560 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7551 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7550 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7515 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7513 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7509 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-7501 skipping CVE-2015-7500 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7499 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7498 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7497 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7200 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7199 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7198 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7197 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7196 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7195 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7194 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7192 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7189 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7187 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7183 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7182 as CVE page is older than CVRF-CVE file. skipping CVE-2015-7181 as CVE page is older than CVRF-CVE file. skipping CVE-2015-6937 as CVE page is older than CVRF-CVE file. skipping CVE-2015-6908 as CVE page is older than CVRF-CVE file. skipping CVE-2015-6749 as CVE page is older than CVRF-CVE file. skipping CVE-2015-6525 as CVE page is older than CVRF-CVE file. skipping CVE-2015-6496 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-6360 skipping CVE-2015-6252 as CVE page is older than CVRF-CVE file. skipping CVE-2015-6251 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5969 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5738 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-5707 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-5707 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2015-5694 skipping CVE-2015-5697 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5621 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5370 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5366 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5364 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5351 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5346 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5345 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5330 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5313 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5312 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5307 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5300 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5299 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5296 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-5286 skipping CVE-2015-5276 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5261 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5260 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5252 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-5245 skipping CVE-2015-5247 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5225 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-5223 skipping CVE-2015-5219 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5200 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5199 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5198 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5196 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5195 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5194 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5186 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5174 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-5163 skipping CVE-2015-5157 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5156 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-5145 skipping CVE-2015-5073 as CVE page is older than CVRF-CVE file. skipping CVE-2015-5041 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4916 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4913 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4911 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4910 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4908 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4906 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4905 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4904 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4903 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4902 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4901 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4895 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4893 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4890 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4883 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4882 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4881 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4879 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4872 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4871 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4870 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4868 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4866 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4864 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4862 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4861 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4860 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4858 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4852 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4844 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4843 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4842 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4840 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4836 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4835 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4833 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4830 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4826 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4819 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4816 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4815 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4810 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4807 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4806 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4805 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4803 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4802 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4800 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4792 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4791 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4766 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4760 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4749 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4748 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4736 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4734 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4733 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4732 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4731 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4729 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4700 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4692 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2015-4646 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2015-4645 skipping CVE-2015-4518 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4515 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4514 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4513 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4167 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4036 as CVE page is older than CVRF-CVE file. skipping CVE-2015-4000 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-3988 no cpe found for SUSE Cloud 2.0 in CVE-2015-3982 skipping CVE-2015-3636 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3622 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2015-3448 skipping CVE-2015-3420 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3416 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-3339 skipping CVE-2015-3331 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-3289 skipping CVE-2015-3291 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3290 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3288 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-3280 skipping CVE-2015-3247 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3243 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3239 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3237 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3236 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3225 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3223 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-3219 skipping CVE-2015-3217 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3216 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3212 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3210 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3197 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3196 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3195 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3194 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3193 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3185 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3164 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3152 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3148 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3146 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3145 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3144 as CVE page is older than CVRF-CVE file. skipping CVE-2015-3143 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2925 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2924 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2922 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2908 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2907 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2906 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-2830 skipping CVE-2015-2808 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2806 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2698 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2697 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2696 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2695 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2694 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2666 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2664 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2659 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2638 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2637 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2632 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2628 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2627 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2625 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2621 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2619 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2613 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2601 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2597 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2596 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2590 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2576 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2575 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2573 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2571 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2568 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2567 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2566 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2328 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2327 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2326 as CVE page is older than CVRF-CVE file. skipping CVE-2015-2325 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-2316 No V5 entry found for CVE-2015-2309 / /home/securitybot/prod/cve-database/cvelistV5/cves/2015/2xxxx/CVE-2015-2309.json:No such file or directory skipping CVE-2015-2304 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-2296 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-2150 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-2042 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-2041 skipping CVE-2015-1931 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1867 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-1856 skipping CVE-2015-1855 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2015-1852 no cpe found for SUSE Cloud 2.0 in CVE-2015-1851 no cpe found for SUSE Cloud 2.0 in CVE-2015-1820 skipping CVE-2015-1819 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1805 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1804 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1803 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1802 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1794 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1793 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1792 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1791 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1790 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1789 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1788 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1782 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1781 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1607 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1606 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1593 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1572 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1547 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1546 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1545 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1472 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1465 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1421 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1420 as CVE page is older than CVRF-CVE file. skipping CVE-2015-1350 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-1339 skipping CVE-2015-0840 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0839 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0816 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0815 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0813 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0807 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2015-0801 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-0777 skipping CVE-2015-0511 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0508 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0507 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0506 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0505 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0503 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0501 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0500 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0499 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0498 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0441 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0439 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0438 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0433 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0432 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0423 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0411 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0409 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0405 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0391 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0385 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0382 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0381 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0374 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0293 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0292 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0289 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0288 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0287 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0286 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0275 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0274 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2015-0272 no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2015-0272 skipping CVE-2015-0254 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0253 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0247 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0245 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0240 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0236 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0228 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0209 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0206 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0205 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0204 as CVE page is older than CVRF-CVE file. skipping CVE-2015-0138 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9922 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9914 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9907 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9904 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2014-9862 skipping CVE-2014-9854 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9853 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9852 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9851 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9850 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9849 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9847 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9846 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9845 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9844 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9843 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9842 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9841 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9840 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9839 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9838 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9837 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9836 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9835 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9834 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9833 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9832 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9831 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9830 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9829 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9828 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9826 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9825 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9824 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9823 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9822 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9821 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9820 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9819 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9818 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9817 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9816 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9815 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9814 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9813 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9812 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9811 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9810 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9809 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9808 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9807 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9806 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9805 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9761 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9750 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9731 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9730 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9729 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9728 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9717 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9710 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-9683 skipping CVE-2014-9672 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9668 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9666 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9665 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9662 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9659 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9656 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9655 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9645 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9644 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-9623 no cpe found for SUSE Cloud 2.0 in CVE-2014-9568 skipping CVE-2014-9585 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9584 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9529 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-9494 no cpe found for SUSE Cloud 2.0 in CVE-2014-9493 skipping CVE-2014-9423 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9422 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9421 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9420 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9419 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-9322 skipping CVE-2014-9298 as CVE page is older than CVRF-CVE file. skipping CVE-2014-9297 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-9130 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-9130 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-9130.xml 2024-09-15 03:47:40.492403000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-9130.xml.new 2024-10-29 03:24:48.813409000 +0100 @@ -14,13 +14,13 @@ 1 - 96 - 2024-09-15T01:47:40Z + 97 + 2024-10-29T02:24:48Z current 2021-05-30T13:24:31Z - 2024-09-15T01:47:40Z + 2024-10-29T02:24:48Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1783,6 +1783,9 @@ libyaml-0-2-0.1.6-4.1 as a component of Image SLES12-SP5-GCE-BYOS + + python3-PyYAML-5.1.2-3.3.1 as a component of Image SLES12-SP5-GCE-BYOS + libyaml-0-2-0.1.6-4.1 as a component of Image SLES12-SP5-GCE-On-Demand @@ -2610,6 +2613,7 @@ Image SLES12-SP5-EC2-SAP-On-Demand:libyaml-0-2-0.1.6-4.1 Image SLES12-SP5-EC2-SAP-On-Demand:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-GCE-BYOS:libyaml-0-2-0.1.6-4.1 + Image SLES12-SP5-GCE-BYOS:python3-PyYAML-5.1.2-3.3.1 Image SLES12-SP5-GCE-On-Demand:libyaml-0-2-0.1.6-4.1 Image SLES12-SP5-GCE-SAP-BYOS:libyaml-0-2-0.1.6-4.1 Image SLES12-SP5-GCE-SAP-BYOS:python3-PyYAML-5.1.2-3.3.1 skipping CVE-2014-9114 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-9090 no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-9028 skipping CVE-2014-8991 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-8962 skipping CVE-2014-8964 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8884 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2014-8692 / /home/securitybot/prod/cve-database/cvelistV5/cves/2014/8xxxx/CVE-2014-8692.json:No such file or directory skipping CVE-2014-8709 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8680 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2014-8650 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-8583 skipping CVE-2014-8564 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8559 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8500 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8369 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8275 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8184 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-8159 skipping CVE-2014-8160 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8150 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8148 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8143 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8134 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8133 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8132 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8131 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-8124 skipping CVE-2014-8121 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8119 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8109 as CVE page is older than CVRF-CVE file. skipping CVE-2014-8086 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7975 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7970 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7842 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7841 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-7826 skipping CVE-2014-7824 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7823 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7822 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-7819 skipping CVE-2014-7817 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7283 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7187 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7186 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7185 as CVE page is older than CVRF-CVE file. skipping CVE-2014-7169 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6568 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6564 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6559 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6558 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6555 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6551 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6531 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6530 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6527 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6520 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6515 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6512 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6511 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6507 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6506 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6505 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6503 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6502 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6500 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6496 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6495 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6494 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6493 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6492 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6491 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6489 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6484 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6478 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6474 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6469 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6464 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6463 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6458 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6457 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6456 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6418 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6410 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6278 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6277 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6272 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6271 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6055 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6054 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6053 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6052 as CVE page is older than CVRF-CVE file. skipping CVE-2014-6051 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5472 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5471 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5461 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5355 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5354 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5353 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5352 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5326 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5270 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5165 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5164 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5163 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5162 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5161 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5139 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5077 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5045 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5044 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-5033 skipping CVE-2014-5031 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5030 as CVE page is older than CVRF-CVE file. skipping CVE-2014-5029 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4975 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4943 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4699 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4656 skipping CVE-2014-4667 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4655 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4654 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4653 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4652 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-4650.xml 2024-10-23 04:08:21.993078000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-4650.xml.new 2024-10-29 03:27:00.477512000 +0100 @@ -14,13 +14,13 @@ 1 - 140 - 2024-10-23T02:08:21Z + 141 + 2024-10-29T02:26:59Z current 2021-05-30T13:22:08Z - 2024-10-23T02:08:21Z + 2024-10-29T02:26:59Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2667,6 +2667,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -5760,6 +5778,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -7481,6 +7517,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2014-4617 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-4615 skipping CVE-2014-4611 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4608 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4607 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4508 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4345 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4344 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4343 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4342 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4341 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4330 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4288 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4287 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4274 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4268 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4266 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4265 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4264 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4263 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4262 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4260 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4258 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4252 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4247 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4244 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4243 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4240 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4238 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4233 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4227 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4223 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4221 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4220 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4219 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4218 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4216 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4214 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4209 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4208 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4207 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4171 as CVE page is older than CVRF-CVE file. skipping CVE-2014-4157 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-4027 skipping CVE-2014-4020 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3970 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3917 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3859 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3801 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3730 skipping CVE-2014-3690 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3688 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3687 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3683 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3675 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3673 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3660 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-3647 skipping CVE-2014-3646 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3645 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3639 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3637 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3636 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3634 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3631 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3611 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3610 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3601 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3594 skipping CVE-2014-3583 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3581 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-3577 skipping CVE-2014-3572 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3571 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3570 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3569 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3568 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3567 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3566 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3564 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3555 skipping CVE-2014-3540 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3537 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3523 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3520 no cpe found for SUSE Cloud 2.0 in CVE-2014-3517 skipping CVE-2014-3513 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3512 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3511 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3510 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3509 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3508 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3507 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3506 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3505 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2014-3499 skipping CVE-2014-3490 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3482 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3476 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3475 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3474 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-3473 skipping CVE-2014-3470 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3466 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3430 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2014-3253 / /home/securitybot/prod/cve-database/cvelistV5/cves/2014/3xxxx/CVE-2014-3253.json:No such file or directory skipping CVE-2014-3424 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3423 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3422 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3421 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3214 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-3186 skipping CVE-2014-3185 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3184 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3181 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3153 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3145 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3144 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3122 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3068 as CVE page is older than CVRF-CVE file. skipping CVE-2014-3065 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2907 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2892 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2856 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-2851 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-2828 skipping CVE-2014-2734 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2014-2686 skipping CVE-2014-2706 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2678 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2672 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-2667.xml 2024-10-23 04:10:57.482449000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2014-2667.xml.new 2024-10-29 03:28:31.345253000 +0100 @@ -14,13 +14,13 @@ 1 - 87 - 2024-10-23T02:10:57Z + 88 + 2024-10-29T02:28:30Z current 2021-05-30T13:20:16Z - 2024-10-23T02:10:57Z + 2024-10-29T02:28:30Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1371,6 +1371,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -2817,6 +2835,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -3713,6 +3749,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2014-2583 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-2573 skipping CVE-2014-2525 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2523 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2494 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2490 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2484 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2483 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2451 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2450 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2444 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2442 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2440 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2438 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2436 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2435 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2434 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2432 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2431 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2430 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2428 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2427 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2423 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2422 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2421 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2420 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2419 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2414 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2413 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2412 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2410 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2409 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2403 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2402 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2401 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2398 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2397 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2338 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2309 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2299 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2283 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2282 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2281 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-2237 skipping CVE-2014-2240 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2146 as CVE page is older than CVRF-CVE file. skipping CVE-2014-2039 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-1948 skipping CVE-2014-1912 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1876 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1874 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-1830 no cpe found for SUSE Cloud 2.0 in CVE-2014-1829 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2014-1745 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2014-1739 skipping CVE-2014-1738 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1737 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-1693 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-1693 skipping CVE-2014-1545 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1542 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1541 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1540 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1538 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1537 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1536 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1534 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1533 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1492 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1446 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1445 as CVE page is older than CVRF-CVE file. skipping CVE-2014-1444 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-1418 skipping CVE-2014-1402 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0592 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0483 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0482 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0481 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0480 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0474 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0473 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0472 skipping CVE-2014-0464 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0463 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0461 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0460 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0459 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0458 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0457 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0456 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0455 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0454 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0453 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0452 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0451 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0449 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0448 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0446 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0432 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0429 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0384 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0333 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0242 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0240 skipping CVE-2014-0231 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0226 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0224 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0221 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0211 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0210 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0209 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-0204 skipping CVE-2014-0203 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0198 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0187 skipping CVE-2014-0196 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0195 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0191 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0190 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0181 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-0167 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0167 skipping CVE-2014-0172 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0162 skipping CVE-2014-0160 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-0157 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0157 skipping CVE-2014-0155 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0134 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0130 skipping CVE-2014-0131 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0118 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0117 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0114 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-0105 skipping CVE-2014-0101 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0098 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2014-0081 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0081 skipping CVE-2014-0077 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0076 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0069 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2014-0056 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0056 skipping CVE-2014-0055 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0050 as CVE page is older than CVRF-CVE file. skipping CVE-2014-0038 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2014-0006 no cpe found for SUSE OpenStack Cloud 3.0 in CVE-2014-0006 skipping CVE-2014-0004 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7470 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7447 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7446 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7422 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7421 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7354 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7353 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7339 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7338 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7271 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7270 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7269 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7268 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7267 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7265 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7264 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7263 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7171 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7041 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-7027 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-7027 skipping CVE-2013-7039 as CVE page is older than CVRF-CVE file. skipping CVE-2013-7038 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6999 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6954 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6885 skipping CVE-2013-6763 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6629 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-6463 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6463 skipping CVE-2013-6450 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6449 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2013-6437 skipping CVE-2013-6438 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-6415 skipping CVE-2013-6401 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2013-6396 skipping CVE-2013-6393 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2013-6384 no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-6383 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6383 no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-6380 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6380 skipping CVE-2013-6382 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6381 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6378 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6376 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-6367 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-6367 skipping CVE-2013-6371 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6370 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6369 as CVE page is older than CVRF-CVE file. skipping CVE-2013-6368 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2013-6044 skipping CVE-2013-5704 as CVE page is older than CVRF-CVE file. skipping CVE-2013-5634 as CVE page is older than CVRF-CVE file. skipping CVE-2013-5607 as CVE page is older than CVRF-CVE file. skipping CVE-2013-5606 as CVE page is older than CVRF-CVE file. skipping CVE-2013-5605 as CVE page is older than CVRF-CVE file. skipping CVE-2013-5123 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4592 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4591 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4587 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4579 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-4514 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-4514 skipping CVE-2013-4516 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4515 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-4511 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-4511 no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4497 skipping CVE-2013-4483 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4477 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-4470 no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4463 skipping CVE-2013-4458 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4449 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4444 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4428 skipping CVE-2013-4387 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4365 skipping CVE-2013-4353 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4350 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-4345 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-4345 no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4314 skipping CVE-2013-4312 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4299 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4282 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4270 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4244 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4243 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4242 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-4238.xml 2024-09-07 03:37:51.135336000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-4238.xml.new 2024-10-29 03:35:09.311493000 +0100 @@ -14,13 +14,13 @@ 1 - 97 - 2024-09-07T01:37:50Z + 98 + 2024-10-29T02:35:08Z current 2021-05-30T13:13:52Z - 2024-09-07T01:37:50Z + 2024-10-29T02:35:08Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2324,6 +2324,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -5537,6 +5555,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -7004,6 +7040,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2013-4235 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-4235.xml 2024-10-20 04:31:05.248874000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-4235.xml.new 2024-10-29 03:35:11.732413000 +0100 @@ -14,13 +14,13 @@ 1 - 89 - 2024-10-20T02:31:04Z + 90 + 2024-10-29T02:35:10Z current 2021-05-30T13:13:52Z - 2024-10-20T02:31:04Z + 2024-10-29T02:35:10Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2532,17 +2532,17 @@ shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand - - shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-GCE-BYOS + + shadow-4.2.1-36.15.1 as a component of Image SLES12-SP5-GCE-BYOS shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-GCE-On-Demand - - shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS + + shadow-4.2.1-36.15.1 as a component of Image SLES12-SP5-GCE-SAP-BYOS - - shadow-4.2.1-36.12.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand + + shadow-4.2.1-36.15.1 as a component of Image SLES12-SP5-GCE-SAP-On-Demand shadow-4.2.1-36.15.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production @@ -4123,10 +4123,10 @@ Image SLES12-SP5-EC2-On-Demand:shadow-4.2.1-36.12.1 Image SLES12-SP5-EC2-SAP-BYOS:shadow-4.2.1-36.15.1 Image SLES12-SP5-EC2-SAP-On-Demand:shadow-4.2.1-36.12.1 - Image SLES12-SP5-GCE-BYOS:shadow-4.2.1-36.12.1 + Image SLES12-SP5-GCE-BYOS:shadow-4.2.1-36.15.1 Image SLES12-SP5-GCE-On-Demand:shadow-4.2.1-36.12.1 - Image SLES12-SP5-GCE-SAP-BYOS:shadow-4.2.1-36.12.1 - Image SLES12-SP5-GCE-SAP-On-Demand:shadow-4.2.1-36.12.1 + Image SLES12-SP5-GCE-SAP-BYOS:shadow-4.2.1-36.15.1 + Image SLES12-SP5-GCE-SAP-On-Demand:shadow-4.2.1-36.15.1 Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:shadow-4.2.1-36.15.1 Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:shadow-4.2.1-36.15.1 Image SLES15-SP3-BYOS-Azure:login_defs-4.8.1-150300.4.18.1 no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-4222 skipping CVE-2013-4232 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4231 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4163 as CVE page is older than CVRF-CVE file. skipping CVE-2013-4162 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2013-4002 no cpe found for SUSE Studio Onsite Runner 1.3 in CVE-2013-3712 skipping CVE-2013-3301 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-3225 skipping CVE-2013-3236 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3235 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3234 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3233 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3232 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3231 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3230 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3229 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3228 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3227 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3226 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3224 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3223 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3222 as CVE page is older than CVRF-CVE file. skipping CVE-2013-3076 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2930 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2929 skipping CVE-2013-2899 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2898 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2897 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2896 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2895 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2894 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2893 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2892 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2891 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2890 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2889 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2888 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2852 no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-2850 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2850 skipping CVE-2013-2851 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2636 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2635 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2634 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2460 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2458 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2449 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2442 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2437 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2436 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2431 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2426 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2423 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2421 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2415 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2407 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2266 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-2255 skipping CVE-2013-2249 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2237 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2234 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2232 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-2217 skipping CVE-2013-2206 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-2167 no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-2166 no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-2164 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2164 no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-2148 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-2148 skipping CVE-2013-2147 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2146 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2142 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2141 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2140 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2139 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2128 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2013-2104 skipping CVE-2013-2094 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2067 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2015 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2003 as CVE page is older than CVRF-CVE file. skipping CVE-2013-2001 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1998 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1989 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1987 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1986 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1985 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1983 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1982 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1979 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1976 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1961 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1960 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1945 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1943 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1929 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1928 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1873 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1860 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1848 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2013-1841 skipping CVE-2013-1827 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1826 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1819 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-1798 skipping CVE-2013-1797 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1796 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1792 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1774 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1773 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1772 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1767 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1763 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1753 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-1752.xml 2024-10-23 04:27:27.374190000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2013-1752.xml.new 2024-10-29 03:38:11.871328000 +0100 @@ -14,13 +14,13 @@ 1 - 135 - 2024-10-23T02:27:26Z + 136 + 2024-10-29T02:38:11Z current 2021-05-30T13:10:33Z - 2024-10-23T02:27:26Z + 2024-10-29T02:38:11Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2408,6 +2408,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -5018,6 +5036,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -6583,6 +6619,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2013-1741 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1622 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1620 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1571 as CVE page is older than CVRF-CVE file. skipping CVE-2013-1488 as CVE page is older than CVRF-CVE file. no cpe found for SUSE OpenStack Cloud 2.0 in CVE-2013-1443 skipping CVE-2013-1445 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2013-1089 / /home/securitybot/prod/cve-database/cvelistV5/cves/2013/1xxxx/CVE-2013-1089.json:No such file or directory no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-1059 no cpe found for SUSE Linux Enterprise Real Time 11 SP3 in CVE-2013-1059 skipping CVE-2013-0914 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0913 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0871 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0784 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0783 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0782 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0781 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0779 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0778 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0777 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0775 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0774 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0773 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0755 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0349 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0343 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Liberty Linux 7 LTSS in CVE-2013-0334 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2013-0326 skipping CVE-2013-0311 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0310 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0309 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0292 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0290 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0268 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-0231 skipping CVE-2013-0228 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0217 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0216 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0211 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Cloud 2.0 in CVE-2013-0179 skipping CVE-2013-0169 as CVE page is older than CVRF-CVE file. skipping CVE-2013-0166 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2013-0160 no cpe found for SUSE Package Hub 15 SP3 in CVE-2012-6709 skipping CVE-2012-6708 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6704 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6703 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6702 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6701 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6689 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6657 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6647 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6549 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6548 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6547 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6546 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6545 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6544 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6543 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6542 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6539 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6538 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6537 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6536 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6111 as CVE page is older than CVRF-CVE file. skipping CVE-2012-6094 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5842 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5840 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5839 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5689 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5688 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5615 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5600 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5599 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5598 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5597 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5595 as CVE page is older than CVRF-CVE file. no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2012-5578 no cpe found for HPE Helion OpenStack Cloud 8 in CVE-2012-5577 skipping CVE-2012-5532 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5517 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5375 as CVE page is older than CVRF-CVE file. skipping CVE-2012-5374 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4929 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4681 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4601 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4571 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4565 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4564 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4542 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4530 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4510 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4508 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4461 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4444 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4398 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4187 as CVE page is older than CVRF-CVE file. skipping CVE-2012-4185 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3992 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3986 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3982 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3878 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3552 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3539 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3520 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3510 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2012-3505 skipping CVE-2012-3430 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2012-3412 skipping CVE-2012-3409 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3386 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3375 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3364 as CVE page is older than CVRF-CVE file. skipping CVE-2012-3136 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2745 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2744 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2737 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2686 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2669 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2012-2395 skipping CVE-2012-2390 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2384 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2383 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2375 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2372 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2313 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2137 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2136 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2133 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2127 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2123 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2121 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2119 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2113 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2110 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2100 as CVE page is older than CVRF-CVE file. skipping CVE-2012-2088 as CVE page is older than CVRF-CVE file. skipping CVE-2012-1601 as CVE page is older than CVRF-CVE file. skipping CVE-2012-1583 as CVE page is older than CVRF-CVE file. skipping CVE-2012-1173 as CVE page is older than CVRF-CVE file. skipping CVE-2012-1165 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2012-1150.xml 2024-09-07 03:47:14.563272000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2012-1150.xml.new 2024-10-29 03:46:18.299371000 +0100 @@ -14,13 +14,13 @@ 1 - 102 - 2024-09-07T01:47:13Z + 103 + 2024-10-29T02:46:17Z current 2021-05-30T13:02:31Z - 2024-09-07T01:47:13Z + 2024-10-29T02:46:17Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -1921,6 +1921,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -4366,6 +4384,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -5612,6 +5648,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2012-1097 skipping CVE-2012-1096 as CVE page is older than CVRF-CVE file. skipping CVE-2012-1090 as CVE page is older than CVRF-CVE file. skipping CVE-2012-1015 as CVE page is older than CVRF-CVE file. skipping CVE-2012-1014 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0957 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0884 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0880 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0879 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0876 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2012-0845.xml 2024-10-23 04:39:14.889177000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2012-0845.xml.new 2024-10-29 03:46:42.247621000 +0100 @@ -14,13 +14,13 @@ 1 - 110 - 2024-10-23T02:39:13Z + 111 + 2024-10-29T02:46:41Z current 2021-05-30T13:02:12Z - 2024-10-23T02:39:13Z + 2024-10-29T02:46:41Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2076,6 +2076,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -4533,6 +4551,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -6321,6 +6357,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2012-0810 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0786 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0698 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0547 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2012-0416 / /home/securitybot/prod/cve-database/cvelistV5/cves/2012/0xxxx/CVE-2012-0416.json:No such file or directory No V5 entry found for CVE-2012-0415 / /home/securitybot/prod/cve-database/cvelistV5/cves/2012/0xxxx/CVE-2012-0415.json:No such file or directory skipping CVE-2012-0058 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0056 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0055 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0050 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2012-0044 skipping CVE-2012-0045 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0028 as CVE page is older than CVRF-CVE file. skipping CVE-2012-0027 as CVE page is older than CVRF-CVE file. skipping CVE-2011-5327 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Server 15 SP4-TERADATA in CVE-2011-5325 skipping CVE-2011-5321 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP2 in CVE-2011-4953 --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2011-4944.xml 2024-10-23 04:41:26.039334000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2011-4944.xml.new 2024-10-29 03:48:01.151494000 +0100 @@ -14,13 +14,13 @@ 1 - 116 - 2024-10-23T02:41:25Z + 117 + 2024-10-29T02:48:00Z current 2021-05-30T13:01:01Z - 2024-10-23T02:41:25Z + 2024-10-29T02:48:00Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2117,6 +2117,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -4574,6 +4592,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -6386,6 +6422,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2011-4917 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4915 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4862 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP2 in CVE-2011-4622 skipping CVE-2011-4619 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4611 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4604 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4594 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4577 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4576 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4517 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4516 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4348 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4330 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4326 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4324 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4132 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4131 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4110 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4108 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4086 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4081 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4080 as CVE page is older than CVRF-CVE file. skipping CVE-2011-4077 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3638 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3593 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3585 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3464 as CVE page is older than CVRF-CVE file. --- /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2011-3389.xml 2024-09-07 03:49:52.539461000 +0200 +++ /mounts/mirror/SuSE/ftp.suse.com/pub/projects/security/cvrf-cve//cvrf-CVE-2011-3389.xml.new 2024-10-29 03:49:21.587307000 +0100 @@ -14,13 +14,13 @@ 1 - 96 - 2024-09-07T01:49:51Z + 97 + 2024-10-29T02:49:19Z current 2021-05-30T12:59:44Z - 2024-09-07T01:49:51Z + 2024-10-29T02:49:19Z cve-database/bin/generate-cvrf-cve.pl 2020-12-27T01:00:00Z @@ -2554,6 +2554,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 + + python314-3.14.0~a1-1.1 + + + python314-curses-3.14.0~a1-1.1 + + + python314-dbm-3.14.0~a1-1.1 + + + python314-idle-3.14.0~a1-1.1 + + + python314-tk-3.14.0~a1-1.1 + + + python314-x86-64-v3-3.14.0~a1-1.1 + python36 @@ -5818,6 +5836,24 @@ python313-x86-64-v3-3.13.0~b3-1.1 as a component of openSUSE Tumbleweed + + python314-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-curses-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-dbm-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-idle-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-tk-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + + + python314-x86-64-v3-3.14.0~a1-1.1 as a component of openSUSE Tumbleweed + python36-3.6.15-1.1 as a component of openSUSE Tumbleweed @@ -7431,6 +7467,12 @@ openSUSE Tumbleweed:python313-idle-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-tk-3.13.0~b3-1.1 openSUSE Tumbleweed:python313-x86-64-v3-3.13.0~b3-1.1 + openSUSE Tumbleweed:python314-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-curses-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-dbm-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-idle-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-tk-3.14.0~a1-1.1 + openSUSE Tumbleweed:python314-x86-64-v3-3.14.0~a1-1.1 openSUSE Tumbleweed:python36-3.6.15-1.1 openSUSE Tumbleweed:python36-32bit-3.6.15-1.1 openSUSE Tumbleweed:python36-curses-3.6.15-1.1 skipping CVE-2011-3363 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3359 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2011-3353 skipping CVE-2011-3351 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3328 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3210 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3207 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3191 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3188 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3048 as CVE page is older than CVRF-CVE file. skipping CVE-2011-3026 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2942 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2928 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2918 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2905 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2898 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 in CVE-2011-2767 no cpe found for SUSE Package Hub 15 SP1 in CVE-2011-2767 skipping CVE-2011-2724 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2707 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2700 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2699 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2695 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2692 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2691 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2690 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2689 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2534 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2525 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2518 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2517 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2501 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2011-2496 skipping CVE-2011-2497 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2011-2495 skipping CVE-2011-2494 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2493 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2492 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2491 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2484 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2482 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2011-2390 / /home/securitybot/prod/cve-database/cvelistV5/cves/2011/2xxxx/CVE-2011-2390.json:No such file or directory skipping CVE-2011-2225 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2213 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2203 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2189 as CVE page is older than CVRF-CVE file. skipping CVE-2011-2182 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1945 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1927 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1833 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1776 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1771 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1770 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1767 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1747 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1745 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1598 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2011-1593 skipping CVE-2011-1585 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1577 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1576 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1573 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1526 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1495 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1494 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1493 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1490 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1489 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1488 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1479 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1478 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1473 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2011-1410 / /home/securitybot/prod/cve-database/cvelistV5/cves/2011/1xxxx/CVE-2011-1410.json:No such file or directory No V5 entry found for CVE-2011-1210 / /home/securitybot/prod/cve-database/cvelistV5/cves/2011/1xxxx/CVE-2011-1210.json:No such file or directory skipping CVE-2011-1182 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1173 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1172 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1171 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1170 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1169 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1163 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1162 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1160 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1098 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1093 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1090 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1083 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1082 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1080 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1079 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1078 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1076 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1023 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1021 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1020 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1019 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1017 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1016 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1013 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1012 as CVE page is older than CVRF-CVE file. skipping CVE-2011-1010 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0999 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0726 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0712 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0711 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0710 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0709 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0699 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0541 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0521 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0463 as CVE page is older than CVRF-CVE file. skipping CVE-2011-0414 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2011-0068 / /home/securitybot/prod/cve-database/cvelistV5/cves/2011/0xxxx/CVE-2011-0068.json:No such file or directory skipping CVE-2011-0014 as CVE page is older than CVRF-CVE file. skipping CVE-2010-5332 as CVE page is older than CVRF-CVE file. skipping CVE-2010-5331 as CVE page is older than CVRF-CVE file. skipping CVE-2010-5321 as CVE page is older than CVRF-CVE file. skipping CVE-2010-5313 as CVE page is older than CVRF-CVE file. skipping CVE-2010-5304 as CVE page is older than CVRF-CVE file. skipping CVE-2010-5298 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4805 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4668 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4655 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4650 skipping CVE-2010-4649 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4648 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4565 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4529 skipping CVE-2010-4527 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4525 skipping CVE-2010-4494 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4347 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4346 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4343 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4342 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2010-4318 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/4xxxx/CVE-2010-4318.json:No such file or directory No V5 entry found for CVE-2010-4315 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/4xxxx/CVE-2010-4315.json:No such file or directory skipping CVE-2010-4267 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4263 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4258 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4256 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4251 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4250 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4249 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4248 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4243 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4242 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4175 skipping CVE-2010-4169 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4164 skipping CVE-2010-4165 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4163 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4162 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4160 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4157 skipping CVE-2010-4158 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4083 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4082 skipping CVE-2010-4081 as CVE page is older than CVRF-CVE file. skipping CVE-2010-4080 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4077 skipping CVE-2010-4078 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4076 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4075 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4074 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4073 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-4072 skipping CVE-2010-4008 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2010-4004 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/4xxxx/CVE-2010-4004.json:No such file or directory No V5 entry found for CVE-2010-4003 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/4xxxx/CVE-2010-4003.json:No such file or directory No V5 entry found for CVE-2010-3997 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3997.json:No such file or directory skipping CVE-2010-3904 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3881 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3880 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3877 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3876 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3875 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3874 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3873 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3865 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3864 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3861 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3858 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3850 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3849 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3848 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3705 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3698 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2010-3675 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3675.json:No such file or directory skipping CVE-2010-3448 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3445 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3442 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3437 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3434 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3432 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2010-3395 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3395.json:No such file or directory No V5 entry found for CVE-2010-3392 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3392.json:No such file or directory No V5 entry found for CVE-2010-3391 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3391.json:No such file or directory No V5 entry found for CVE-2010-3390 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3390.json:No such file or directory No V5 entry found for CVE-2010-3388 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3388.json:No such file or directory No V5 entry found for CVE-2010-3379 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3379.json:No such file or directory No V5 entry found for CVE-2010-3371 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3371.json:No such file or directory No V5 entry found for CVE-2010-3370 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3370.json:No such file or directory No V5 entry found for CVE-2010-3368 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3368.json:No such file or directory No V5 entry found for CVE-2010-3367 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3367.json:No such file or directory No V5 entry found for CVE-2010-3356 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3356.json:No such file or directory No V5 entry found for CVE-2010-3352 / /home/securitybot/prod/cve-database/cvelistV5/cves/2010/3xxxx/CVE-2010-3352.json:No such file or directory no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-3310 skipping CVE-2010-3301 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3298 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3297 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3296 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3192 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3086 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3084 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3081 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3080 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3079 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3078 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3067 as CVE page is older than CVRF-CVE file. skipping CVE-2010-3066 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-3015 skipping CVE-2010-2995 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2994 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2993 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2992 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2962 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2960 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2959 no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2955 skipping CVE-2010-2954 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2946 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2943 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2942 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2939 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2891 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2803 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2798 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2537 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2524 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2521 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2495 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2492 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2249 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2248 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2243 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2240 as CVE page is older than CVRF-CVE file. skipping CVE-2010-2226 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-2221 skipping CVE-2010-2066 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1643 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1641 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1636 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1633 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1446 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1437 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1436 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1205 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1188 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1173 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1172 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1162 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1148 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1146 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1126 as CVE page is older than CVRF-CVE file. skipping CVE-2010-1000 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0926 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP1 in CVE-2010-0743 skipping CVE-2010-0742 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0741 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0740 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0730 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0624 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0623 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0415 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0410 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0307 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0205 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0015 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0008 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0007 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0006 as CVE page is older than CVRF-CVE file. skipping CVE-2010-0003 as CVE page is older than CVRF-CVE file. no entry found for CVE-2009-5515 / /home/securitybot/prod/cve-database/cvelist/2009/5xxxx/CVE-2009-5515.json:No such file or directory No V5 entry found for CVE-2009-5515 / /home/securitybot/prod/cve-database/cvelistV5/cves/2009/5xxxx/CVE-2009-5515.json:No such file or directory skipping CVE-2009-5146 as CVE page is older than CVRF-CVE file. skipping CVE-2009-5081 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4538 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4537 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4536 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4308 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4307 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4306 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4138 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4131 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP1 in CVE-2009-4112 skipping CVE-2009-4067 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4031 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4030 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4028 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4027 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4026 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4020 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4019 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4012 as CVE page is older than CVRF-CVE file. skipping CVE-2009-4004 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3939 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3889 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3725 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3720 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3640 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3638 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3624 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3623 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3621 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3620 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3612 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3560 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3559 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3556 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3547 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3379 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3297 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3286 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3280 as CVE page is older than CVRF-CVE file. skipping CVE-2009-3228 as CVE page is older than CVRF-CVE file. no cpe found for Subscription Management Tool 11 in CVE-2009-3050 No V5 entry found for CVE-2009-2941 / /home/securitybot/prod/cve-database/cvelistV5/cves/2009/2xxxx/CVE-2009-2941.json:No such file or directory skipping CVE-2009-2910 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2908 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2905 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2903 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2848 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2844 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2767 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2698 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2691 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2688 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2625 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2408 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2407 as CVE page is older than CVRF-CVE file. skipping CVE-2009-2406 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1961 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1895 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1885 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1883 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1633 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1630 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1439 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1389 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1387 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1386 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1385 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1381 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1379 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1378 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1377 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1337 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1336 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1298 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1265 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1242 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1192 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1185 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1143 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1072 as CVE page is older than CVRF-CVE file. skipping CVE-2009-1046 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0935 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0887 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0835 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0834 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0798 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0789 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0787 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0778 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0745 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0696 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0676 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0591 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0590 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2009-0539 / /home/securitybot/prod/cve-database/cvelistV5/cves/2009/0xxxx/CVE-2009-0539.json:No such file or directory skipping CVE-2009-0342 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0322 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0269 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0217 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0179 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0065 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0040 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0029 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0025 as CVE page is older than CVRF-CVE file. skipping CVE-2009-0024 as CVE page is older than CVRF-CVE file. skipping CVE-2008-7247 as CVE page is older than CVRF-CVE file. skipping CVE-2008-6123 as CVE page is older than CVRF-CVE file. skipping CVE-2008-5702 as CVE page is older than CVRF-CVE file. skipping CVE-2008-5700 as CVE page is older than CVRF-CVE file. skipping CVE-2008-5351 as CVE page is older than CVRF-CVE file. skipping CVE-2008-5300 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2008-5255 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/5xxxx/CVE-2008-5255.json:No such file or directory No V5 entry found for CVE-2008-5254 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/5xxxx/CVE-2008-5254.json:No such file or directory No V5 entry found for CVE-2008-5253 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/5xxxx/CVE-2008-5253.json:No such file or directory No V5 entry found for CVE-2008-5251 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/5xxxx/CVE-2008-5251.json:No such file or directory skipping CVE-2008-5182 as CVE page is older than CVRF-CVE file. skipping CVE-2008-5138 as CVE page is older than CVRF-CVE file. skipping CVE-2008-5079 as CVE page is older than CVRF-CVE file. skipping CVE-2008-5077 as CVE page is older than CVRF-CVE file. skipping CVE-2008-5033 as CVE page is older than CVRF-CVE file. skipping CVE-2008-5029 as CVE page is older than CVRF-CVE file. skipping CVE-2008-4864 as CVE page is older than CVRF-CVE file. skipping CVE-2008-4824 as CVE page is older than CVRF-CVE file. skipping CVE-2008-4554 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2008-4550 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/4xxxx/CVE-2008-4550.json:No such file or directory skipping CVE-2008-4503 as CVE page is older than CVRF-CVE file. skipping CVE-2008-4445 as CVE page is older than CVRF-CVE file. skipping CVE-2008-4410 as CVE page is older than CVRF-CVE file. skipping CVE-2008-4307 as CVE page is older than CVRF-CVE file. skipping CVE-2008-4302 as CVE page is older than CVRF-CVE file. skipping CVE-2008-4210 as CVE page is older than CVRF-CVE file. skipping CVE-2008-4113 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3964 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3915 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3911 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3833 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3831 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3792 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3534 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3528 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3527 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3526 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3496 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3277 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3275 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3247 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3144 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3143 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3142 as CVE page is older than CVRF-CVE file. skipping CVE-2008-3077 as CVE page is older than CVRF-CVE file. skipping CVE-2008-2931 as CVE page is older than CVRF-CVE file. skipping CVE-2008-2826 as CVE page is older than CVRF-CVE file. skipping CVE-2008-2812 as CVE page is older than CVRF-CVE file. skipping CVE-2008-2750 as CVE page is older than CVRF-CVE file. skipping CVE-2008-2544 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP5 in CVE-2008-2383 skipping CVE-2008-2365 as CVE page is older than CVRF-CVE file. skipping CVE-2008-2358 as CVE page is older than CVRF-CVE file. skipping CVE-2008-2316 as CVE page is older than CVRF-CVE file. skipping CVE-2008-2315 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2008-2141 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/2xxxx/CVE-2008-2141.json:No such file or directory skipping CVE-2008-2079 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1947 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1887 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1721 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1679 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1675 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1673 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1672 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1586 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2008-1424 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/1xxxx/CVE-2008-1424.json:No such file or directory No V5 entry found for CVE-2008-1418 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/1xxxx/CVE-2008-1418.json:No such file or directory skipping CVE-2008-1391 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1382 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1367 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1236 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1196 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1195 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1194 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1193 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1192 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1191 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1190 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1189 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1188 as CVE page is older than CVRF-CVE file. skipping CVE-2008-1187 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Package Hub 15 SP3 in CVE-2008-1142 no cpe found for SUSE Package Hub 15 SP4 in CVE-2008-1142 skipping CVE-2008-0891 as CVE page is older than CVRF-CVE file. skipping CVE-2008-0657 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2008-0637 / /home/securitybot/prod/cve-database/cvelistV5/cves/2008/0xxxx/CVE-2008-0637.json:No such file or directory skipping CVE-2008-0352 as CVE page is older than CVRF-CVE file. skipping CVE-2008-0010 as CVE page is older than CVRF-CVE file. skipping CVE-2008-0009 as CVE page is older than CVRF-CVE file. skipping CVE-2008-0007 as CVE page is older than CVRF-CVE file. skipping CVE-2008-0001 as CVE page is older than CVRF-CVE file. skipping CVE-2007-6762 as CVE page is older than CVRF-CVE file. skipping CVE-2007-6720 as CVE page is older than CVRF-CVE file. skipping CVE-2007-6716 as CVE page is older than CVRF-CVE file. skipping CVE-2007-6304 as CVE page is older than CVRF-CVE file. skipping CVE-2007-6303 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2007-6251 / /home/securitybot/prod/cve-database/cvelistV5/cves/2007/6xxxx/CVE-2007-6251.json:No such file or directory skipping CVE-2007-6243 as CVE page is older than CVRF-CVE file. skipping CVE-2007-6206 as CVE page is older than CVRF-CVE file. skipping CVE-2007-6063 as CVE page is older than CVRF-CVE file. skipping CVE-2007-5970 as CVE page is older than CVRF-CVE file. skipping CVE-2007-5969 as CVE page is older than CVRF-CVE file. skipping CVE-2007-5966 as CVE page is older than CVRF-CVE file. skipping CVE-2007-5623 as CVE page is older than CVRF-CVE file. skipping CVE-2007-5135 as CVE page is older than CVRF-CVE file. skipping CVE-2007-4995 as CVE page is older than CVRF-CVE file. skipping CVE-2007-4774 as CVE page is older than CVRF-CVE file. skipping CVE-2007-4571 as CVE page is older than CVRF-CVE file. skipping CVE-2007-4567 as CVE page is older than CVRF-CVE file. skipping CVE-2007-4559 as CVE page is older than CVRF-CVE file. skipping CVE-2007-4308 as CVE page is older than CVRF-CVE file. skipping CVE-2007-4133 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3999 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3852 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3851 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3719 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3641 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3513 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3108 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3107 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3105 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3104 as CVE page is older than CVRF-CVE file. skipping CVE-2007-3102 as CVE page is older than CVRF-CVE file. skipping CVE-2007-2878 as CVE page is older than CVRF-CVE file. skipping CVE-2007-2875 as CVE page is older than CVRF-CVE file. skipping CVE-2007-2870 as CVE page is older than CVRF-CVE file. skipping CVE-2007-2788 as CVE page is older than CVRF-CVE file. skipping CVE-2007-2052 as CVE page is older than CVRF-CVE file. skipping CVE-2007-1497 as CVE page is older than CVRF-CVE file. skipping CVE-2007-1496 as CVE page is older than CVRF-CVE file. skipping CVE-2007-0005 as CVE page is older than CVRF-CVE file. skipping CVE-2006-20001 as CVE page is older than CVRF-CVE file. skipping CVE-2006-7250 as CVE page is older than CVRF-CVE file. skipping CVE-2006-7248 as CVE page is older than CVRF-CVE file. skipping CVE-2006-7246 as CVE page is older than CVRF-CVE file. skipping CVE-2006-6106 as CVE page is older than CVRF-CVE file. skipping CVE-2006-5793 as CVE page is older than CVRF-CVE file. skipping CVE-2006-5757 as CVE page is older than CVRF-CVE file. skipping CVE-2006-5751 as CVE page is older than CVRF-CVE file. skipping CVE-2006-5701 as CVE page is older than CVRF-CVE file. skipping CVE-2006-5464 as CVE page is older than CVRF-CVE file. skipping CVE-2006-5052 as CVE page is older than CVRF-CVE file. skipping CVE-2006-5051 as CVE page is older than CVRF-CVE file. skipping CVE-2006-4980 as CVE page is older than CVRF-CVE file. skipping CVE-2006-4814 as CVE page is older than CVRF-CVE file. skipping CVE-2006-4640 as CVE page is older than CVRF-CVE file. skipping CVE-2006-4623 as CVE page is older than CVRF-CVE file. skipping CVE-2006-4572 as CVE page is older than CVRF-CVE file. skipping CVE-2006-4343 as CVE page is older than CVRF-CVE file. skipping CVE-2006-4339 as CVE page is older than CVRF-CVE file. skipping CVE-2006-4227 as CVE page is older than CVRF-CVE file. skipping CVE-2006-4226 as CVE page is older than CVRF-CVE file. skipping CVE-2006-3809 as CVE page is older than CVRF-CVE file. skipping CVE-2006-3738 as CVE page is older than CVRF-CVE file. skipping CVE-2006-3635 as CVE page is older than CVRF-CVE file. skipping CVE-2006-2940 as CVE page is older than CVRF-CVE file. skipping CVE-2006-2937 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2006-2628 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2628.json:No such file or directory No V5 entry found for CVE-2006-2627 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2627.json:No such file or directory No V5 entry found for CVE-2006-2626 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2626.json:No such file or directory No V5 entry found for CVE-2006-2625 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2625.json:No such file or directory No V5 entry found for CVE-2006-2624 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2624.json:No such file or directory No V5 entry found for CVE-2006-2623 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2623.json:No such file or directory No V5 entry found for CVE-2006-2622 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2622.json:No such file or directory No V5 entry found for CVE-2006-2621 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2621.json:No such file or directory No V5 entry found for CVE-2006-2620 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2620.json:No such file or directory No V5 entry found for CVE-2006-2619 / /home/securitybot/prod/cve-database/cvelistV5/cves/2006/2xxxx/CVE-2006-2619.json:No such file or directory skipping CVE-2006-0903 as CVE page is older than CVRF-CVE file. skipping CVE-2005-4900 as CVE page is older than CVRF-CVE file. skipping CVE-2005-4881 as CVE page is older than CVRF-CVE file. skipping CVE-2005-3623 as CVE page is older than CVRF-CVE file. skipping CVE-2005-2555 as CVE page is older than CVRF-CVE file. skipping CVE-2005-2553 as CVE page is older than CVRF-CVE file. skipping CVE-2005-2492 as CVE page is older than CVRF-CVE file. skipping CVE-2005-2458 as CVE page is older than CVRF-CVE file. skipping CVE-2005-2098 as CVE page is older than CVRF-CVE file. skipping CVE-2005-1918 as CVE page is older than CVRF-CVE file. skipping CVE-2005-1767 as CVE page is older than CVRF-CVE file. skipping CVE-2005-1763 as CVE page is older than CVRF-CVE file. skipping CVE-2005-1265 as CVE page is older than CVRF-CVE file. skipping CVE-2005-1264 as CVE page is older than CVRF-CVE file. skipping CVE-2005-0749 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2005-0717 / /home/securitybot/prod/cve-database/cvelistV5/cves/2005/0xxxx/CVE-2005-0717.json:No such file or directory skipping CVE-2005-0400 as CVE page is older than CVRF-CVE file. skipping CVE-2005-0210 as CVE page is older than CVRF-CVE file. skipping CVE-2005-0102 as CVE page is older than CVRF-CVE file. skipping CVE-2005-0068 as CVE page is older than CVRF-CVE file. skipping CVE-2005-0067 as CVE page is older than CVRF-CVE file. skipping CVE-2005-0066 as CVE page is older than CVRF-CVE file. skipping CVE-2005-0065 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2004-1178 / /home/securitybot/prod/cve-database/cvelistV5/cves/2004/1xxxx/CVE-2004-1178.json:No such file or directory skipping CVE-2004-1074 as CVE page is older than CVRF-CVE file. skipping CVE-2004-1060 as CVE page is older than CVRF-CVE file. skipping CVE-2004-0791 as CVE page is older than CVRF-CVE file. skipping CVE-2004-0790 as CVE page is older than CVRF-CVE file. skipping CVE-2004-0657 as CVE page is older than CVRF-CVE file. skipping CVE-2004-0452 as CVE page is older than CVRF-CVE file. skipping CVE-2004-0421 as CVE page is older than CVRF-CVE file. no cpe found for SUSE Linux Enterprise Real Time 11 SP4 in CVE-2004-0230 skipping CVE-2003-1332 as CVE page is older than CVRF-CVE file. skipping CVE-2003-0282 as CVE page is older than CVRF-CVE file. skipping CVE-2003-0252 as CVE page is older than CVRF-CVE file. No V5 entry found for CVE-2003-0250 / /home/securitybot/prod/cve-database/cvelistV5/cves/2003/0xxxx/CVE-2003-0250.json:No such file or directory skipping CVE-2003-0028 as CVE page is older than CVRF-CVE file. skipping CVE-2002-20001 as CVE page is older than CVRF-CVE file. skipping CVE-2001-0851 as CVE page is older than CVRF-CVE file. skipping CVE-2001-0405 as CVE page is older than CVRF-CVE file. skipping CVE-2000-1254 as CVE page is older than CVRF-CVE file. skipping CVE-1999-0524 as CVE page is older than CVRF-CVE file. skipping CVE-1999-0517 as CVE page is older than CVRF-CVE file. skipping CVE-1999-0077 as CVE page is older than CVRF-CVE file. SUCCESS