Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-45078
Vulnerability from cvelistv5
Published
2021-12-15 19:37
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
0.20%
(0.42101)
Summary
stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T04:32:13.513Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=161e87d12167b1e36193385485c1f6ce92f74f02", }, { name: "FEDORA-2021-f2c6802743", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/", }, { name: "FEDORA-2021-3614c0b466", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20220107-0002/", }, { name: "GLSA-202208-30", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202208-30", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-15T00:13:30", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", }, { tags: [ "x_refsource_MISC", ], url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=161e87d12167b1e36193385485c1f6ce92f74f02", }, { name: "FEDORA-2021-f2c6802743", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/", }, { name: "FEDORA-2021-3614c0b466", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20220107-0002/", }, { name: "GLSA-202208-30", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202208-30", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-45078", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", refsource: "MISC", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", }, { name: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02", refsource: "MISC", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02", }, { name: "FEDORA-2021-f2c6802743", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/", }, { name: "FEDORA-2021-3614c0b466", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/", }, { name: "https://security.netapp.com/advisory/ntap-20220107-0002/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220107-0002/", }, { name: "GLSA-202208-30", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-30", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-45078", datePublished: "2021-12-15T19:37:46", dateReserved: "2021-12-15T00:00:00", dateUpdated: "2024-08-04T04:32:13.513Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2021-45078\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-12-15T20:15:08.797\",\"lastModified\":\"2024-11-21T06:31:54.293\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.\"},{\"lang\":\"es\",\"value\":\"La función stab_xcoff_builtin_type en el archivo stabs.c en GNU Binutils versiones hasta 2.37, permite a atacantes causar una denegación de servicio (desbordamiento de búfer basado en la pila) o posiblemente tener otro impacto no especificado, como lo demuestra una escritura fuera de límites. NOTA: este problema se presenta debido a una corrección incorrecta de CVE-2018-12699\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.37\",\"matchCriteriaId\":\"9C5537A9-DB91-42A6-BA36-70AF3883D1FE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}]}]}],\"references\":[{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-30\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220107-0002/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=28694\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=161e87d12167b1e36193385485c1f6ce92f74f02\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220107-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/bugzilla/show_bug.cgi?id=28694\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=161e87d12167b1e36193385485c1f6ce92f74f02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
suse-su-2022:4277-1
Vulnerability from csaf_suse
Published
2022-11-29 14:41
Modified
2022-11-29 14:41
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils fixes the following issues:
The following security bugs were fixed:
- CVE-2019-1010204: Fixed out-of-bounds read in elfcpp/elfcpp_file.h (bsc#1142579).
- CVE-2021-3530: Fixed stack-based buffer overflow in demangle_path() in rust-demangle.c (bsc#1185597).
- CVE-2021-3648: Fixed infinite loop while demangling rust symbols (bsc#1188374).
- CVE-2021-3826: Fixed heap/stack buffer overflow in the dlang_lname function in d-demangle.c (bsc#1202969).
- CVE-2021-45078: Fixed out-of-bounds write in stab_xcoff_builtin_type() in stabs.c (bsc#1193929).
- CVE-2021-46195: Fixed uncontrolled recursion in libiberty/rust-demangle.c (bsc#1194783).
- CVE-2022-27943: Fixed stack exhaustion in demangle_const in (bsc#1197592).
- CVE-2022-38126: Fixed assertion fail in the display_debug_names() function in binutils/dwarf.c (bsc#1202966).
- CVE-2022-38127: Fixed NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c (bsc#1202967).
- CVE-2022-38533: Fixed heap out-of-bounds read in bfd_getl32 (bsc#1202816).
The following non-security bugs were fixed:
- SLE toolchain update of binutils, update to 2.39 from 2.37.
- Update to 2.39:
* The ELF linker will now generate a warning message if the stack is made
executable. Similarly it will warn if the output binary contains a
segment with all three of the read, write and execute permission
bits set. These warnings are intended to help developers identify
programs which might be vulnerable to attack via these executable
memory regions.
The warnings are enabled by default but can be disabled via a command
line option. It is also possible to build a linker with the warnings
disabled, should that be necessary.
* The ELF linker now supports a --package-metadata option that allows
embedding a JSON payload in accordance to the Package Metadata
specification.
* In linker scripts it is now possible to use TYPE=<type> in an output
section description to set the section type value.
* The objdump program now supports coloured/colored syntax
highlighting of its disassembler output for some architectures.
(Currently: AVR, RiscV, s390, x86, x86_64).
* The nm program now supports a --no-weak/-W option to make it ignore
weak symbols.
* The readelf and objdump programs now support a -wE option to prevent
them from attempting to access debuginfod servers when following
links.
* The objcopy program's --weaken, --weaken-symbol, and
--weaken-symbols options now works with unique symbols as well.
- Update to 2.38:
* elfedit: Add --output-abiversion option to update ABIVERSION.
* Add support for the LoongArch instruction set.
* Tools which display symbols or strings (readelf, strings, nm, objdump)
have a new command line option which controls how unicode characters are
handled. By default they are treated as normal for the tool. Using
--unicode=locale will display them according to the current locale.
Using --unicode=hex will display them as hex byte values, whilst
--unicode=escape will display them as escape sequences. In addition
using --unicode=highlight will display them as unicode escape sequences
highlighted in red (if supported by the output device).
* readelf -r dumps RELR relative relocations now.
* Support for efi-app-aarch64, efi-rtdrv-aarch64 and efi-bsdrv-aarch64 has been
added to objcopy in order to enable UEFI development using binutils (bsc#1198458).
* ar: Add --thin for creating thin archives. -T is a deprecated alias without
diagnostics. In many ar implementations -T has a different meaning, as
specified by X/Open System Interface.
* Add support for AArch64 system registers that were missing in previous
releases.
* Add support for the LoongArch instruction set.
* Add a command-line option, -muse-unaligned-vector-move, for x86 target
to encode aligned vector move as unaligned vector move.
* Add support for Cortex-R52+ for Arm.
* Add support for Cortex-A510, Cortex-A710, Cortex-X2 for AArch64.
* Add support for Cortex-A710 for Arm.
* Add support for Scalable Matrix Extension (SME) for AArch64.
* The --multibyte-handling=[allow|warn|warn-sym-only] option tells the
assembler what to when it encoutners multibyte characters in the input. The
default is to allow them. Setting the option to 'warn' will generate a
warning message whenever any multibyte character is encountered. Using the
option to 'warn-sym-only' will make the assembler generate a warning whenever a
symbol is defined containing multibyte characters. (References to undefined
symbols will not generate warnings).
* Outputs of .ds.x directive and .tfloat directive with hex input from
x86 assembler have been reduced from 12 bytes to 10 bytes to match the
output of .tfloat directive.
* Add support for 'armv8.8-a', 'armv9-a', 'armv9.1-a', 'armv9.2-a' and
'armv9.3-a' for -march in AArch64 GAS.
* Add support for 'armv8.7-a', 'armv8.8-a', 'armv9-a', 'armv9.1-a',
'armv9.2-a' and 'armv9.3-a' for -march in Arm GAS.
* Add support for Intel AVX512_FP16 instructions.
* Add -z pack-relative-relocs/-z no pack-relative-relocs to x86 ELF
linker to pack relative relocations in the DT_RELR section.
* Add support for the LoongArch architecture.
* Add -z indirect-extern-access/-z noindirect-extern-access to x86 ELF
linker to control canonical function pointers and copy relocation.
* Add --max-cache-size=SIZE to set the the maximum cache size to SIZE
bytes.
- Fixed regression that prevented .ko.debug to be loaded in crash tool (bsc#1191908).
- Explicitly enable --enable-warn-execstack=yes and --enable-warn-rwx-segments=yes.
- Add gprofng subpackage.
- Include recognition of 'z16' name for 'arch14' on s390. (bsc#1198237).
- Add back fix for bsc#1191473, which got lost in the update to 2.38.
- Install symlinks for all target specific tools on arm-eabi-none (bsc#1185712).
- Enable PRU architecture for AM335x CPU (Beagle Bone Black board)
Patchnames
SUSE-2022-4277,SUSE-OpenStack-Cloud-9-2022-4277,SUSE-OpenStack-Cloud-Crowbar-9-2022-4277,SUSE-SLE-SAP-12-SP4-2022-4277,SUSE-SLE-SDK-12-SP5-2022-4277,SUSE-SLE-SERVER-12-SP2-BCL-2022-4277,SUSE-SLE-SERVER-12-SP3-BCL-2022-4277,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4277,SUSE-SLE-SERVER-12-SP5-2022-4277
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils fixes the following issues:\nThe following security bugs were fixed:\n\n- CVE-2019-1010204: Fixed out-of-bounds read in elfcpp/elfcpp_file.h (bsc#1142579).\n- CVE-2021-3530: Fixed stack-based buffer overflow in demangle_path() in rust-demangle.c (bsc#1185597).\n- CVE-2021-3648: Fixed infinite loop while demangling rust symbols (bsc#1188374).\n- CVE-2021-3826: Fixed heap/stack buffer overflow in the dlang_lname function in d-demangle.c (bsc#1202969).\n- CVE-2021-45078: Fixed out-of-bounds write in stab_xcoff_builtin_type() in stabs.c (bsc#1193929).\n- CVE-2021-46195: Fixed uncontrolled recursion in libiberty/rust-demangle.c (bsc#1194783).\n- CVE-2022-27943: Fixed stack exhaustion in demangle_const in (bsc#1197592).\n- CVE-2022-38126: Fixed assertion fail in the display_debug_names() function in binutils/dwarf.c (bsc#1202966).\n- CVE-2022-38127: Fixed NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c (bsc#1202967).\n- CVE-2022-38533: Fixed heap out-of-bounds read in bfd_getl32 (bsc#1202816).\n\n\nThe following non-security bugs were fixed:\n \n- SLE toolchain update of binutils, update to 2.39 from 2.37.\n- Update to 2.39: \n * The ELF linker will now generate a warning message if the stack is made\n executable. Similarly it will warn if the output binary contains a\n segment with all three of the read, write and execute permission\n bits set. These warnings are intended to help developers identify\n programs which might be vulnerable to attack via these executable\n memory regions.\n The warnings are enabled by default but can be disabled via a command\n line option. It is also possible to build a linker with the warnings\n disabled, should that be necessary.\n * The ELF linker now supports a --package-metadata option that allows\n embedding a JSON payload in accordance to the Package Metadata\n specification. \n * In linker scripts it is now possible to use TYPE=<type> in an output\n section description to set the section type value.\n * The objdump program now supports coloured/colored syntax\n highlighting of its disassembler output for some architectures.\n (Currently: AVR, RiscV, s390, x86, x86_64).\n * The nm program now supports a --no-weak/-W option to make it ignore\n weak symbols.\n * The readelf and objdump programs now support a -wE option to prevent\n them from attempting to access debuginfod servers when following\n links.\n * The objcopy program's --weaken, --weaken-symbol, and\n --weaken-symbols options now works with unique symbols as well.\n\n- Update to 2.38:\n * elfedit: Add --output-abiversion option to update ABIVERSION.\n * Add support for the LoongArch instruction set.\n * Tools which display symbols or strings (readelf, strings, nm, objdump)\n have a new command line option which controls how unicode characters are\n handled. By default they are treated as normal for the tool. Using\n --unicode=locale will display them according to the current locale.\n Using --unicode=hex will display them as hex byte values, whilst\n --unicode=escape will display them as escape sequences. In addition\n using --unicode=highlight will display them as unicode escape sequences\n highlighted in red (if supported by the output device).\n * readelf -r dumps RELR relative relocations now.\n * Support for efi-app-aarch64, efi-rtdrv-aarch64 and efi-bsdrv-aarch64 has been\n added to objcopy in order to enable UEFI development using binutils (bsc#1198458).\n * ar: Add --thin for creating thin archives. -T is a deprecated alias without\n diagnostics. In many ar implementations -T has a different meaning, as\n specified by X/Open System Interface.\n * Add support for AArch64 system registers that were missing in previous\n releases.\n * Add support for the LoongArch instruction set.\n * Add a command-line option, -muse-unaligned-vector-move, for x86 target\n to encode aligned vector move as unaligned vector move.\n * Add support for Cortex-R52+ for Arm.\n * Add support for Cortex-A510, Cortex-A710, Cortex-X2 for AArch64.\n * Add support for Cortex-A710 for Arm.\n * Add support for Scalable Matrix Extension (SME) for AArch64.\n * The --multibyte-handling=[allow|warn|warn-sym-only] option tells the\n assembler what to when it encoutners multibyte characters in the input. The\n default is to allow them. Setting the option to 'warn' will generate a\n warning message whenever any multibyte character is encountered. Using the\n option to 'warn-sym-only' will make the assembler generate a warning whenever a\n symbol is defined containing multibyte characters. (References to undefined\n symbols will not generate warnings).\n * Outputs of .ds.x directive and .tfloat directive with hex input from\n x86 assembler have been reduced from 12 bytes to 10 bytes to match the\n output of .tfloat directive.\n * Add support for 'armv8.8-a', 'armv9-a', 'armv9.1-a', 'armv9.2-a' and\n 'armv9.3-a' for -march in AArch64 GAS.\n * Add support for 'armv8.7-a', 'armv8.8-a', 'armv9-a', 'armv9.1-a',\n 'armv9.2-a' and 'armv9.3-a' for -march in Arm GAS.\n * Add support for Intel AVX512_FP16 instructions.\n * Add -z pack-relative-relocs/-z no pack-relative-relocs to x86 ELF\n linker to pack relative relocations in the DT_RELR section.\n * Add support for the LoongArch architecture.\n * Add -z indirect-extern-access/-z noindirect-extern-access to x86 ELF\n linker to control canonical function pointers and copy relocation.\n * Add --max-cache-size=SIZE to set the the maximum cache size to SIZE\n bytes.\n\n- Fixed regression that prevented .ko.debug to be loaded in crash tool (bsc#1191908).\n- Explicitly enable --enable-warn-execstack=yes and --enable-warn-rwx-segments=yes.\n- Add gprofng subpackage.\n- Include recognition of 'z16' name for 'arch14' on s390. (bsc#1198237).\n- Add back fix for bsc#1191473, which got lost in the update to 2.38.\n- Install symlinks for all target specific tools on arm-eabi-none (bsc#1185712).\n- Enable PRU architecture for AM335x CPU (Beagle Bone Black board)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-4277,SUSE-OpenStack-Cloud-9-2022-4277,SUSE-OpenStack-Cloud-Crowbar-9-2022-4277,SUSE-SLE-SAP-12-SP4-2022-4277,SUSE-SLE-SDK-12-SP5-2022-4277,SUSE-SLE-SERVER-12-SP2-BCL-2022-4277,SUSE-SLE-SERVER-12-SP3-BCL-2022-4277,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4277,SUSE-SLE-SERVER-12-SP5-2022-4277", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4277-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:4277-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20224277-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:4277-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013145.html", }, { category: "self", summary: "SUSE Bug 1142579", url: "https://bugzilla.suse.com/1142579", }, { category: "self", summary: "SUSE Bug 1185597", url: "https://bugzilla.suse.com/1185597", }, { category: "self", summary: "SUSE Bug 1185712", url: "https://bugzilla.suse.com/1185712", }, { category: "self", summary: "SUSE Bug 1188374", url: "https://bugzilla.suse.com/1188374", }, { category: "self", summary: "SUSE Bug 1191473", url: "https://bugzilla.suse.com/1191473", }, { category: "self", summary: "SUSE Bug 1191908", url: "https://bugzilla.suse.com/1191908", }, { category: "self", summary: "SUSE Bug 1193929", url: "https://bugzilla.suse.com/1193929", }, { category: "self", summary: "SUSE Bug 1194783", url: "https://bugzilla.suse.com/1194783", }, { category: "self", summary: "SUSE Bug 1197592", url: "https://bugzilla.suse.com/1197592", }, { category: "self", summary: "SUSE Bug 1198237", url: "https://bugzilla.suse.com/1198237", }, { category: "self", summary: "SUSE Bug 1198458", url: "https://bugzilla.suse.com/1198458", }, { category: "self", summary: "SUSE Bug 1202816", url: "https://bugzilla.suse.com/1202816", }, { category: "self", summary: "SUSE Bug 1202966", url: "https://bugzilla.suse.com/1202966", }, { category: "self", summary: "SUSE Bug 1202967", url: "https://bugzilla.suse.com/1202967", }, { category: "self", summary: "SUSE Bug 1202969", url: "https://bugzilla.suse.com/1202969", }, { category: "self", summary: "SUSE CVE CVE-2019-1010204 page", url: "https://www.suse.com/security/cve/CVE-2019-1010204/", }, { category: "self", summary: "SUSE CVE CVE-2021-3530 page", url: "https://www.suse.com/security/cve/CVE-2021-3530/", }, { category: "self", summary: "SUSE CVE CVE-2021-3648 page", url: "https://www.suse.com/security/cve/CVE-2021-3648/", }, { category: "self", summary: "SUSE CVE CVE-2021-3826 page", url: "https://www.suse.com/security/cve/CVE-2021-3826/", }, { category: "self", summary: "SUSE CVE CVE-2021-45078 page", url: "https://www.suse.com/security/cve/CVE-2021-45078/", }, { category: "self", summary: "SUSE CVE CVE-2021-46195 page", url: "https://www.suse.com/security/cve/CVE-2021-46195/", }, { category: "self", summary: "SUSE CVE CVE-2022-27943 page", url: "https://www.suse.com/security/cve/CVE-2022-27943/", }, { category: "self", summary: "SUSE CVE CVE-2022-38126 page", url: "https://www.suse.com/security/cve/CVE-2022-38126/", }, { category: "self", summary: "SUSE CVE CVE-2022-38127 page", url: "https://www.suse.com/security/cve/CVE-2022-38127/", }, { category: "self", summary: "SUSE CVE CVE-2022-38533 page", url: "https://www.suse.com/security/cve/CVE-2022-38533/", }, ], title: "Security update for binutils", tracking: { current_release_date: "2022-11-29T14:41:50Z", generator: { date: "2022-11-29T14:41:50Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:4277-1", initial_release_date: "2022-11-29T14:41:50Z", revision_history: [ { date: "2022-11-29T14:41:50Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.39-9.50.1.aarch64", product: { name: "binutils-2.39-9.50.1.aarch64", product_id: "binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "binutils-devel-2.39-9.50.1.aarch64", product: { name: "binutils-devel-2.39-9.50.1.aarch64", product_id: "binutils-devel-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "binutils-gold-2.39-9.50.1.aarch64", product: { name: "binutils-gold-2.39-9.50.1.aarch64", product_id: "binutils-gold-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-9.50.1.aarch64", product: { name: "cross-arm-binutils-2.39-9.50.1.aarch64", product_id: "cross-arm-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-9.50.1.aarch64", product: { name: "cross-avr-binutils-2.39-9.50.1.aarch64", product_id: "cross-avr-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-9.50.1.aarch64", product: { name: "cross-hppa-binutils-2.39-9.50.1.aarch64", product_id: "cross-hppa-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-9.50.1.aarch64", product: { name: "cross-hppa64-binutils-2.39-9.50.1.aarch64", product_id: "cross-hppa64-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-i386-binutils-2.39-9.50.1.aarch64", product: { name: "cross-i386-binutils-2.39-9.50.1.aarch64", product_id: "cross-i386-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-9.50.1.aarch64", product: { name: "cross-ia64-binutils-2.39-9.50.1.aarch64", product_id: "cross-ia64-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-9.50.1.aarch64", product: { name: "cross-m68k-binutils-2.39-9.50.1.aarch64", product_id: "cross-m68k-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-9.50.1.aarch64", product: { name: "cross-mips-binutils-2.39-9.50.1.aarch64", product_id: "cross-mips-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-9.50.1.aarch64", product: { name: "cross-ppc-binutils-2.39-9.50.1.aarch64", product_id: "cross-ppc-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-9.50.1.aarch64", product: { name: "cross-ppc64-binutils-2.39-9.50.1.aarch64", product_id: "cross-ppc64-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.39-9.50.1.aarch64", product: { name: "cross-ppc64le-binutils-2.39-9.50.1.aarch64", product_id: "cross-ppc64le-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-9.50.1.aarch64", product: { name: "cross-s390-binutils-2.39-9.50.1.aarch64", product_id: "cross-s390-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.39-9.50.1.aarch64", product: { name: "cross-s390x-binutils-2.39-9.50.1.aarch64", product_id: "cross-s390x-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-9.50.1.aarch64", product: { name: "cross-sparc-binutils-2.39-9.50.1.aarch64", product_id: "cross-sparc-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-9.50.1.aarch64", product: { name: "cross-sparc64-binutils-2.39-9.50.1.aarch64", product_id: "cross-sparc64-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-9.50.1.aarch64", product: { name: "cross-spu-binutils-2.39-9.50.1.aarch64", product_id: "cross-spu-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.39-9.50.1.aarch64", product: { name: "cross-x86_64-binutils-2.39-9.50.1.aarch64", product_id: "cross-x86_64-binutils-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-9.50.1.aarch64", product: { name: "libctf-nobfd0-2.39-9.50.1.aarch64", product_id: "libctf-nobfd0-2.39-9.50.1.aarch64", }, }, { category: "product_version", name: "libctf0-2.39-9.50.1.aarch64", product: { name: "libctf0-2.39-9.50.1.aarch64", product_id: "libctf0-2.39-9.50.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-devel-64bit-2.39-9.50.1.aarch64_ilp32", product: { name: "binutils-devel-64bit-2.39-9.50.1.aarch64_ilp32", product_id: "binutils-devel-64bit-2.39-9.50.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "binutils-2.39-9.50.1.i586", product: { name: "binutils-2.39-9.50.1.i586", product_id: "binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "binutils-devel-2.39-9.50.1.i586", product: { name: "binutils-devel-2.39-9.50.1.i586", product_id: "binutils-devel-2.39-9.50.1.i586", }, }, { category: "product_version", name: "binutils-gold-2.39-9.50.1.i586", product: { name: "binutils-gold-2.39-9.50.1.i586", product_id: "binutils-gold-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.39-9.50.1.i586", product: { name: "cross-aarch64-binutils-2.39-9.50.1.i586", product_id: "cross-aarch64-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-9.50.1.i586", product: { name: "cross-arm-binutils-2.39-9.50.1.i586", product_id: "cross-arm-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-9.50.1.i586", product: { name: "cross-avr-binutils-2.39-9.50.1.i586", product_id: "cross-avr-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-9.50.1.i586", product: { name: "cross-hppa-binutils-2.39-9.50.1.i586", product_id: "cross-hppa-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-9.50.1.i586", product: { name: "cross-hppa64-binutils-2.39-9.50.1.i586", product_id: "cross-hppa64-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-9.50.1.i586", product: { name: "cross-ia64-binutils-2.39-9.50.1.i586", product_id: "cross-ia64-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-9.50.1.i586", product: { name: "cross-m68k-binutils-2.39-9.50.1.i586", product_id: "cross-m68k-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-9.50.1.i586", product: { name: "cross-mips-binutils-2.39-9.50.1.i586", product_id: "cross-mips-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-9.50.1.i586", product: { name: "cross-ppc-binutils-2.39-9.50.1.i586", product_id: "cross-ppc-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-9.50.1.i586", product: { name: "cross-ppc64-binutils-2.39-9.50.1.i586", product_id: "cross-ppc64-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.39-9.50.1.i586", product: { name: "cross-ppc64le-binutils-2.39-9.50.1.i586", product_id: "cross-ppc64le-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-9.50.1.i586", product: { name: "cross-s390-binutils-2.39-9.50.1.i586", product_id: "cross-s390-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-s390x-binutils-2.39-9.50.1.i586", product: { name: "cross-s390x-binutils-2.39-9.50.1.i586", product_id: "cross-s390x-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-9.50.1.i586", product: { name: "cross-sparc-binutils-2.39-9.50.1.i586", product_id: "cross-sparc-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-9.50.1.i586", product: { name: "cross-sparc64-binutils-2.39-9.50.1.i586", product_id: "cross-sparc64-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-9.50.1.i586", product: { name: "cross-spu-binutils-2.39-9.50.1.i586", product_id: "cross-spu-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.39-9.50.1.i586", product: { name: "cross-x86_64-binutils-2.39-9.50.1.i586", product_id: "cross-x86_64-binutils-2.39-9.50.1.i586", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-9.50.1.i586", product: { name: "libctf-nobfd0-2.39-9.50.1.i586", product_id: "libctf-nobfd0-2.39-9.50.1.i586", }, }, { category: "product_version", name: "libctf0-2.39-9.50.1.i586", product: { name: "libctf0-2.39-9.50.1.i586", product_id: "libctf0-2.39-9.50.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "binutils-2.39-9.50.1.ppc64le", product: { name: "binutils-2.39-9.50.1.ppc64le", product_id: "binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.39-9.50.1.ppc64le", product: { name: "binutils-devel-2.39-9.50.1.ppc64le", product_id: "binutils-devel-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "binutils-gold-2.39-9.50.1.ppc64le", product: { name: "binutils-gold-2.39-9.50.1.ppc64le", product_id: "binutils-gold-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-aarch64-binutils-2.39-9.50.1.ppc64le", product_id: "cross-aarch64-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-arm-binutils-2.39-9.50.1.ppc64le", product_id: "cross-arm-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-avr-binutils-2.39-9.50.1.ppc64le", product_id: "cross-avr-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-hppa-binutils-2.39-9.50.1.ppc64le", product_id: "cross-hppa-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-hppa64-binutils-2.39-9.50.1.ppc64le", product_id: "cross-hppa64-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-i386-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-i386-binutils-2.39-9.50.1.ppc64le", product_id: "cross-i386-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-ia64-binutils-2.39-9.50.1.ppc64le", product_id: "cross-ia64-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-m68k-binutils-2.39-9.50.1.ppc64le", product_id: "cross-m68k-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-mips-binutils-2.39-9.50.1.ppc64le", product_id: "cross-mips-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-ppc-binutils-2.39-9.50.1.ppc64le", product_id: "cross-ppc-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-ppc64-binutils-2.39-9.50.1.ppc64le", product_id: "cross-ppc64-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-s390-binutils-2.39-9.50.1.ppc64le", product_id: "cross-s390-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-s390x-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-s390x-binutils-2.39-9.50.1.ppc64le", product_id: "cross-s390x-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-sparc-binutils-2.39-9.50.1.ppc64le", product_id: "cross-sparc-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-sparc64-binutils-2.39-9.50.1.ppc64le", product_id: "cross-sparc64-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-spu-binutils-2.39-9.50.1.ppc64le", product_id: "cross-spu-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.39-9.50.1.ppc64le", product: { name: "cross-x86_64-binutils-2.39-9.50.1.ppc64le", product_id: "cross-x86_64-binutils-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-9.50.1.ppc64le", product: { name: "libctf-nobfd0-2.39-9.50.1.ppc64le", product_id: "libctf-nobfd0-2.39-9.50.1.ppc64le", }, }, { category: "product_version", name: "libctf0-2.39-9.50.1.ppc64le", product: { name: "libctf0-2.39-9.50.1.ppc64le", product_id: "libctf0-2.39-9.50.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.39-9.50.1.s390", product: { name: "binutils-2.39-9.50.1.s390", product_id: "binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "binutils-devel-2.39-9.50.1.s390", product: { name: "binutils-devel-2.39-9.50.1.s390", product_id: "binutils-devel-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.39-9.50.1.s390", product: { name: "cross-aarch64-binutils-2.39-9.50.1.s390", product_id: "cross-aarch64-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-9.50.1.s390", product: { name: "cross-arm-binutils-2.39-9.50.1.s390", product_id: "cross-arm-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-9.50.1.s390", product: { name: "cross-avr-binutils-2.39-9.50.1.s390", product_id: "cross-avr-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-9.50.1.s390", product: { name: "cross-hppa-binutils-2.39-9.50.1.s390", product_id: "cross-hppa-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-9.50.1.s390", product: { name: "cross-hppa64-binutils-2.39-9.50.1.s390", product_id: "cross-hppa64-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-i386-binutils-2.39-9.50.1.s390", product: { name: "cross-i386-binutils-2.39-9.50.1.s390", product_id: "cross-i386-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-9.50.1.s390", product: { name: "cross-ia64-binutils-2.39-9.50.1.s390", product_id: "cross-ia64-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-9.50.1.s390", product: { name: "cross-m68k-binutils-2.39-9.50.1.s390", product_id: "cross-m68k-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-9.50.1.s390", product: { name: "cross-mips-binutils-2.39-9.50.1.s390", product_id: "cross-mips-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-9.50.1.s390", product: { name: "cross-ppc-binutils-2.39-9.50.1.s390", product_id: "cross-ppc-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-9.50.1.s390", product: { name: "cross-ppc64-binutils-2.39-9.50.1.s390", product_id: "cross-ppc64-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.39-9.50.1.s390", product: { name: "cross-ppc64le-binutils-2.39-9.50.1.s390", product_id: "cross-ppc64le-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-s390x-binutils-2.39-9.50.1.s390", product: { name: "cross-s390x-binutils-2.39-9.50.1.s390", product_id: "cross-s390x-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-9.50.1.s390", product: { name: "cross-sparc-binutils-2.39-9.50.1.s390", product_id: "cross-sparc-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-9.50.1.s390", product: { name: "cross-sparc64-binutils-2.39-9.50.1.s390", product_id: "cross-sparc64-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-9.50.1.s390", product: { name: "cross-spu-binutils-2.39-9.50.1.s390", product_id: "cross-spu-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.39-9.50.1.s390", product: { name: "cross-x86_64-binutils-2.39-9.50.1.s390", product_id: "cross-x86_64-binutils-2.39-9.50.1.s390", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-9.50.1.s390", product: { name: "libctf-nobfd0-2.39-9.50.1.s390", product_id: "libctf-nobfd0-2.39-9.50.1.s390", }, }, { category: "product_version", name: "libctf0-2.39-9.50.1.s390", product: { name: "libctf0-2.39-9.50.1.s390", product_id: "libctf0-2.39-9.50.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "binutils-2.39-9.50.1.s390x", product: { name: "binutils-2.39-9.50.1.s390x", product_id: "binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "binutils-devel-2.39-9.50.1.s390x", product: { name: "binutils-devel-2.39-9.50.1.s390x", product_id: "binutils-devel-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "binutils-devel-32bit-2.39-9.50.1.s390x", product: { name: "binutils-devel-32bit-2.39-9.50.1.s390x", product_id: "binutils-devel-32bit-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "binutils-gold-2.39-9.50.1.s390x", product: { name: "binutils-gold-2.39-9.50.1.s390x", product_id: "binutils-gold-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.39-9.50.1.s390x", product: { name: "cross-aarch64-binutils-2.39-9.50.1.s390x", product_id: "cross-aarch64-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-9.50.1.s390x", product: { name: "cross-arm-binutils-2.39-9.50.1.s390x", product_id: "cross-arm-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-9.50.1.s390x", product: { name: "cross-avr-binutils-2.39-9.50.1.s390x", product_id: "cross-avr-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-9.50.1.s390x", product: { name: "cross-hppa-binutils-2.39-9.50.1.s390x", product_id: "cross-hppa-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-9.50.1.s390x", product: { name: "cross-hppa64-binutils-2.39-9.50.1.s390x", product_id: "cross-hppa64-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-i386-binutils-2.39-9.50.1.s390x", product: { name: "cross-i386-binutils-2.39-9.50.1.s390x", product_id: "cross-i386-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-9.50.1.s390x", product: { name: "cross-ia64-binutils-2.39-9.50.1.s390x", product_id: "cross-ia64-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-9.50.1.s390x", product: { name: "cross-m68k-binutils-2.39-9.50.1.s390x", product_id: "cross-m68k-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-9.50.1.s390x", product: { name: "cross-mips-binutils-2.39-9.50.1.s390x", product_id: "cross-mips-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-9.50.1.s390x", product: { name: "cross-ppc-binutils-2.39-9.50.1.s390x", product_id: "cross-ppc-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-9.50.1.s390x", product: { name: "cross-ppc64-binutils-2.39-9.50.1.s390x", product_id: "cross-ppc64-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.39-9.50.1.s390x", product: { name: "cross-ppc64le-binutils-2.39-9.50.1.s390x", product_id: "cross-ppc64le-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-9.50.1.s390x", product: { name: "cross-s390-binutils-2.39-9.50.1.s390x", product_id: "cross-s390-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-9.50.1.s390x", product: { name: "cross-sparc-binutils-2.39-9.50.1.s390x", product_id: "cross-sparc-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-9.50.1.s390x", product: { name: "cross-sparc64-binutils-2.39-9.50.1.s390x", product_id: "cross-sparc64-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-9.50.1.s390x", product: { name: "cross-spu-binutils-2.39-9.50.1.s390x", product_id: "cross-spu-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.39-9.50.1.s390x", product: { name: "cross-x86_64-binutils-2.39-9.50.1.s390x", product_id: "cross-x86_64-binutils-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-9.50.1.s390x", product: { name: "libctf-nobfd0-2.39-9.50.1.s390x", product_id: "libctf-nobfd0-2.39-9.50.1.s390x", }, }, { category: "product_version", name: "libctf0-2.39-9.50.1.s390x", product: { name: "libctf0-2.39-9.50.1.s390x", product_id: "libctf0-2.39-9.50.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.39-9.50.1.x86_64", product: { name: "binutils-2.39-9.50.1.x86_64", product_id: "binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.39-9.50.1.x86_64", product: { name: "binutils-devel-2.39-9.50.1.x86_64", product_id: "binutils-devel-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.39-9.50.1.x86_64", product: { name: "binutils-devel-32bit-2.39-9.50.1.x86_64", product_id: "binutils-devel-32bit-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.39-9.50.1.x86_64", product: { name: "binutils-gold-2.39-9.50.1.x86_64", product_id: "binutils-gold-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.39-9.50.1.x86_64", product: { name: "cross-aarch64-binutils-2.39-9.50.1.x86_64", product_id: "cross-aarch64-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-9.50.1.x86_64", product: { name: "cross-arm-binutils-2.39-9.50.1.x86_64", product_id: "cross-arm-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-9.50.1.x86_64", product: { name: "cross-avr-binutils-2.39-9.50.1.x86_64", product_id: "cross-avr-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-9.50.1.x86_64", product: { name: "cross-hppa-binutils-2.39-9.50.1.x86_64", product_id: "cross-hppa-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-9.50.1.x86_64", product: { name: "cross-hppa64-binutils-2.39-9.50.1.x86_64", product_id: "cross-hppa64-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-i386-binutils-2.39-9.50.1.x86_64", product: { name: "cross-i386-binutils-2.39-9.50.1.x86_64", product_id: "cross-i386-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-9.50.1.x86_64", product: { name: "cross-ia64-binutils-2.39-9.50.1.x86_64", product_id: "cross-ia64-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-9.50.1.x86_64", product: { name: "cross-m68k-binutils-2.39-9.50.1.x86_64", product_id: "cross-m68k-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-9.50.1.x86_64", product: { name: "cross-mips-binutils-2.39-9.50.1.x86_64", product_id: "cross-mips-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-9.50.1.x86_64", product: { name: "cross-ppc-binutils-2.39-9.50.1.x86_64", product_id: "cross-ppc-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-9.50.1.x86_64", product: { name: "cross-ppc64-binutils-2.39-9.50.1.x86_64", product_id: "cross-ppc64-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.39-9.50.1.x86_64", product: { name: "cross-ppc64le-binutils-2.39-9.50.1.x86_64", product_id: "cross-ppc64le-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-9.50.1.x86_64", product: { name: "cross-s390-binutils-2.39-9.50.1.x86_64", product_id: "cross-s390-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.39-9.50.1.x86_64", product: { name: "cross-s390x-binutils-2.39-9.50.1.x86_64", product_id: "cross-s390x-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-9.50.1.x86_64", product: { name: "cross-sparc-binutils-2.39-9.50.1.x86_64", product_id: "cross-sparc-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-9.50.1.x86_64", product: { name: "cross-sparc64-binutils-2.39-9.50.1.x86_64", product_id: "cross-sparc64-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-9.50.1.x86_64", product: { name: "cross-spu-binutils-2.39-9.50.1.x86_64", product_id: "cross-spu-binutils-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-9.50.1.x86_64", product: { name: "libctf-nobfd0-2.39-9.50.1.x86_64", product_id: "libctf-nobfd0-2.39-9.50.1.x86_64", }, }, { category: "product_version", name: "libctf0-2.39-9.50.1.x86_64", product: { name: "libctf0-2.39-9.50.1.x86_64", product_id: "libctf0-2.39-9.50.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", }, product_reference: "binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", }, product_reference: "binutils-devel-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", }, product_reference: "libctf0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", }, product_reference: "binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", }, product_reference: "binutils-devel-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", }, product_reference: "libctf0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", }, product_reference: "binutils-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", }, product_reference: "binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", }, product_reference: "binutils-devel-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", }, product_reference: "binutils-devel-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", }, product_reference: "libctf0-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", }, product_reference: "libctf0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", }, product_reference: "binutils-devel-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", }, product_reference: "binutils-devel-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", }, product_reference: "binutils-devel-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", }, product_reference: "binutils-devel-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", }, product_reference: "binutils-gold-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", }, product_reference: "binutils-gold-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", }, product_reference: "binutils-gold-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", }, product_reference: "binutils-gold-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", }, product_reference: "cross-ppc-binutils-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", }, product_reference: "cross-ppc-binutils-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", }, product_reference: "cross-ppc-binutils-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", }, product_reference: "cross-ppc-binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", }, product_reference: "cross-spu-binutils-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", }, product_reference: "cross-spu-binutils-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", }, product_reference: "cross-spu-binutils-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", }, product_reference: "cross-spu-binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", }, product_reference: "binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", }, product_reference: "binutils-devel-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", }, product_reference: "libctf0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", }, product_reference: "binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", }, product_reference: "binutils-devel-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", }, product_reference: "libctf0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", }, product_reference: "binutils-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", }, product_reference: "binutils-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", }, product_reference: "binutils-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", }, product_reference: "binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", }, product_reference: "binutils-devel-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", }, product_reference: "binutils-devel-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", }, product_reference: "binutils-devel-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", }, product_reference: "binutils-devel-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", }, product_reference: "libctf-nobfd0-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", }, product_reference: "libctf0-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", }, product_reference: "libctf0-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", }, product_reference: "libctf0-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", }, product_reference: "libctf0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", }, product_reference: "binutils-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", }, product_reference: "binutils-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", }, product_reference: "binutils-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", }, product_reference: "binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", }, product_reference: "binutils-devel-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", }, product_reference: "binutils-devel-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", }, product_reference: "binutils-devel-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", }, product_reference: "binutils-devel-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", }, product_reference: "libctf-nobfd0-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", }, product_reference: "libctf0-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", }, product_reference: "libctf0-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", }, product_reference: "libctf0-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", }, product_reference: "libctf0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", }, product_reference: "binutils-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", }, product_reference: "binutils-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", }, product_reference: "binutils-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", }, product_reference: "binutils-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", }, product_reference: "binutils-devel-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", }, product_reference: "binutils-devel-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", }, product_reference: "binutils-devel-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", }, product_reference: "binutils-devel-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", }, product_reference: "libctf-nobfd0-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", }, product_reference: "libctf0-2.39-9.50.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", }, product_reference: "libctf0-2.39-9.50.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", }, product_reference: "libctf0-2.39-9.50.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-9.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", }, product_reference: "libctf0-2.39-9.50.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2019-1010204", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010204", }, ], notes: [ { category: "general", text: "GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010204", url: "https://www.suse.com/security/cve/CVE-2019-1010204", }, { category: "external", summary: "SUSE Bug 1142579 for CVE-2019-1010204", url: "https://bugzilla.suse.com/1142579", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "low", }, ], title: "CVE-2019-1010204", }, { cve: "CVE-2021-3530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3530", }, ], notes: [ { category: "general", text: "A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3530", url: "https://www.suse.com/security/cve/CVE-2021-3530", }, { category: "external", summary: "SUSE Bug 1185597 for CVE-2021-3530", url: "https://bugzilla.suse.com/1185597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "low", }, ], title: "CVE-2021-3530", }, { cve: "CVE-2021-3648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3648", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3530. Reason: This candidate is a reservation duplicate of CVE-2021-3530. Notes: All CVE users should reference CVE-2021-3530 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3648", url: "https://www.suse.com/security/cve/CVE-2021-3648", }, { category: "external", summary: "SUSE Bug 1188374 for CVE-2021-3648", url: "https://bugzilla.suse.com/1188374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "low", }, ], title: "CVE-2021-3648", }, { cve: "CVE-2021-3826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3826", }, ], notes: [ { category: "general", text: "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3826", url: "https://www.suse.com/security/cve/CVE-2021-3826", }, { category: "external", summary: "SUSE Bug 1202969 for CVE-2021-3826", url: "https://bugzilla.suse.com/1202969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "moderate", }, ], title: "CVE-2021-3826", }, { cve: "CVE-2021-45078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45078", }, ], notes: [ { category: "general", text: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45078", url: "https://www.suse.com/security/cve/CVE-2021-45078", }, { category: "external", summary: "SUSE Bug 1193929 for CVE-2021-45078", url: "https://bugzilla.suse.com/1193929", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "moderate", }, ], title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46195", }, ], notes: [ { category: "general", text: "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46195", url: "https://www.suse.com/security/cve/CVE-2021-46195", }, { category: "external", summary: "SUSE Bug 1194783 for CVE-2021-46195", url: "https://bugzilla.suse.com/1194783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "low", }, ], title: "CVE-2021-46195", }, { cve: "CVE-2022-27943", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-27943", }, ], notes: [ { category: "general", text: "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-27943", url: "https://www.suse.com/security/cve/CVE-2022-27943", }, { category: "external", summary: "SUSE Bug 1197592 for CVE-2022-27943", url: "https://bugzilla.suse.com/1197592", }, { category: "external", summary: "SUSE Bug 1205481 for CVE-2022-27943", url: "https://bugzilla.suse.com/1205481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "moderate", }, ], title: "CVE-2022-27943", }, { cve: "CVE-2022-38126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-38126", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-38126", url: "https://www.suse.com/security/cve/CVE-2022-38126", }, { category: "external", summary: "SUSE Bug 1202966 for CVE-2022-38126", url: "https://bugzilla.suse.com/1202966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "moderate", }, ], title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-38127", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-38127", url: "https://www.suse.com/security/cve/CVE-2022-38127", }, { category: "external", summary: "SUSE Bug 1202967 for CVE-2022-38127", url: "https://bugzilla.suse.com/1202967", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "moderate", }, ], title: "CVE-2022-38127", }, { cve: "CVE-2022-38533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-38533", }, ], notes: [ { category: "general", text: "In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-38533", url: "https://www.suse.com/security/cve/CVE-2022-38533", }, { category: "external", summary: "SUSE Bug 1202816 for CVE-2022-38533", url: "https://bugzilla.suse.com/1202816", }, { category: "external", summary: "SUSE Bug 1206168 for CVE-2022-38533", url: "https://bugzilla.suse.com/1206168", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libctf0-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-devel-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:binutils-gold-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-ppc-binutils-2.39-9.50.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:cross-spu-binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud 9:libctf0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:binutils-devel-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf-nobfd0-2.39-9.50.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:libctf0-2.39-9.50.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-29T14:41:50Z", details: "moderate", }, ], title: "CVE-2022-38533", }, ], }
suse-su-2022:4146-1
Vulnerability from csaf_suse
Published
2022-11-21 08:57
Modified
2022-11-21 08:57
Summary
Security update for binutils
Notes
Title of the patch
Security update for binutils
Description of the patch
This update for binutils fixes the following issues:
The following security bugs were fixed:
- CVE-2019-1010204: Fixed out-of-bounds read in elfcpp/elfcpp_file.h (bsc#1142579).
- CVE-2021-3530: Fixed stack-based buffer overflow in demangle_path() in rust-demangle.c (bsc#1185597).
- CVE-2021-3648: Fixed infinite loop while demangling rust symbols (bsc#1188374).
- CVE-2021-3826: Fixed heap/stack buffer overflow in the dlang_lname function in d-demangle.c (bsc#1202969).
- CVE-2021-45078: Fixed out-of-bounds write in stab_xcoff_builtin_type() in stabs.c (bsc#1193929).
- CVE-2021-46195: Fixed uncontrolled recursion in libiberty/rust-demangle.c (bsc#1194783).
- CVE-2022-27943: Fixed stack exhaustion in demangle_const in (bsc#1197592).
- CVE-2022-38126: Fixed assertion fail in the display_debug_names() function in binutils/dwarf.c (bsc#1202966).
- CVE-2022-38127: Fixed NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c (bsc#1202967).
- CVE-2022-38533: Fixed heap out-of-bounds read in bfd_getl32 (bsc#1202816).
The following non-security bugs were fixed:
- SLE toolchain update of binutils, update to 2.39 from 2.37.
- Update to 2.39:
* The ELF linker will now generate a warning message if the stack is made
executable. Similarly it will warn if the output binary contains a
segment with all three of the read, write and execute permission
bits set. These warnings are intended to help developers identify
programs which might be vulnerable to attack via these executable
memory regions.
The warnings are enabled by default but can be disabled via a command
line option. It is also possible to build a linker with the warnings
disabled, should that be necessary.
* The ELF linker now supports a --package-metadata option that allows
embedding a JSON payload in accordance to the Package Metadata
specification.
* In linker scripts it is now possible to use TYPE=<type> in an output
section description to set the section type value.
* The objdump program now supports coloured/colored syntax
highlighting of its disassembler output for some architectures.
(Currently: AVR, RiscV, s390, x86, x86_64).
* The nm program now supports a --no-weak/-W option to make it ignore
weak symbols.
* The readelf and objdump programs now support a -wE option to prevent
them from attempting to access debuginfod servers when following
links.
* The objcopy program's --weaken, --weaken-symbol, and
--weaken-symbols options now works with unique symbols as well.
- Update to 2.38:
* elfedit: Add --output-abiversion option to update ABIVERSION.
* Add support for the LoongArch instruction set.
* Tools which display symbols or strings (readelf, strings, nm, objdump)
have a new command line option which controls how unicode characters are
handled. By default they are treated as normal for the tool. Using
--unicode=locale will display them according to the current locale.
Using --unicode=hex will display them as hex byte values, whilst
--unicode=escape will display them as escape sequences. In addition
using --unicode=highlight will display them as unicode escape sequences
highlighted in red (if supported by the output device).
* readelf -r dumps RELR relative relocations now.
* Support for efi-app-aarch64, efi-rtdrv-aarch64 and efi-bsdrv-aarch64 has been
added to objcopy in order to enable UEFI development using binutils.
* ar: Add --thin for creating thin archives. -T is a deprecated alias without
diagnostics. In many ar implementations -T has a different meaning, as
specified by X/Open System Interface.
* Add support for AArch64 system registers that were missing in previous
releases.
* Add support for the LoongArch instruction set.
* Add a command-line option, -muse-unaligned-vector-move, for x86 target
to encode aligned vector move as unaligned vector move.
* Add support for Cortex-R52+ for Arm.
* Add support for Cortex-A510, Cortex-A710, Cortex-X2 for AArch64.
* Add support for Cortex-A710 for Arm.
* Add support for Scalable Matrix Extension (SME) for AArch64.
* The --multibyte-handling=[allow|warn|warn-sym-only] option tells the
assembler what to when it encoutners multibyte characters in the input. The
default is to allow them. Setting the option to 'warn' will generate a
warning message whenever any multibyte character is encountered. Using the
option to 'warn-sym-only' will make the assembler generate a warning whenever a
symbol is defined containing multibyte characters. (References to undefined
symbols will not generate warnings).
* Outputs of .ds.x directive and .tfloat directive with hex input from
x86 assembler have been reduced from 12 bytes to 10 bytes to match the
output of .tfloat directive.
* Add support for 'armv8.8-a', 'armv9-a', 'armv9.1-a', 'armv9.2-a' and
'armv9.3-a' for -march in AArch64 GAS.
* Add support for 'armv8.7-a', 'armv8.8-a', 'armv9-a', 'armv9.1-a',
'armv9.2-a' and 'armv9.3-a' for -march in Arm GAS.
* Add support for Intel AVX512_FP16 instructions.
* Add -z pack-relative-relocs/-z no pack-relative-relocs to x86 ELF
linker to pack relative relocations in the DT_RELR section.
* Add support for the LoongArch architecture.
* Add -z indirect-extern-access/-z noindirect-extern-access to x86 ELF
linker to control canonical function pointers and copy relocation.
* Add --max-cache-size=SIZE to set the the maximum cache size to SIZE
bytes.
- Explicitly enable --enable-warn-execstack=yes and --enable-warn-rwx-segments=yes.
- Add gprofng subpackage.
- Include recognition of 'z16' name for 'arch14' on s390. (bsc#1198237).
- Add back fix for bsc#1191473, which got lost in the update to 2.38.
- Install symlinks for all target specific tools on arm-eabi-none (bsc#1185712).
- Enable PRU architecture for AM335x CPU (Beagle Bone Black board)
Patchnames
SUSE-2022-4146,SUSE-SLE-Module-Basesystem-15-SP3-2022-4146,SUSE-SLE-Module-Basesystem-15-SP4-2022-4146,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4146,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4146,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4146,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4146,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4146,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4146,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4146,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4146,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4146,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4146,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4146,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4146,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4146,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4146,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4146,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4146,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4146,SUSE-Storage-6-2022-4146,SUSE-Storage-7-2022-4146,openSUSE-SLE-15.3-2022-4146,openSUSE-SLE-15.4-2022-4146
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for binutils", title: "Title of the patch", }, { category: "description", text: "This update for binutils fixes the following issues:\n\nThe following security bugs were fixed:\n\n- CVE-2019-1010204: Fixed out-of-bounds read in elfcpp/elfcpp_file.h (bsc#1142579).\n- CVE-2021-3530: Fixed stack-based buffer overflow in demangle_path() in rust-demangle.c (bsc#1185597).\n- CVE-2021-3648: Fixed infinite loop while demangling rust symbols (bsc#1188374).\n- CVE-2021-3826: Fixed heap/stack buffer overflow in the dlang_lname function in d-demangle.c (bsc#1202969).\n- CVE-2021-45078: Fixed out-of-bounds write in stab_xcoff_builtin_type() in stabs.c (bsc#1193929).\n- CVE-2021-46195: Fixed uncontrolled recursion in libiberty/rust-demangle.c (bsc#1194783).\n- CVE-2022-27943: Fixed stack exhaustion in demangle_const in (bsc#1197592).\n- CVE-2022-38126: Fixed assertion fail in the display_debug_names() function in binutils/dwarf.c (bsc#1202966).\n- CVE-2022-38127: Fixed NULL pointer dereference in the read_and_display_attr_value() function in binutils/dwarf.c (bsc#1202967).\n- CVE-2022-38533: Fixed heap out-of-bounds read in bfd_getl32 (bsc#1202816).\n\n\nThe following non-security bugs were fixed:\n \n- SLE toolchain update of binutils, update to 2.39 from 2.37.\n- Update to 2.39: \n * The ELF linker will now generate a warning message if the stack is made\n executable. Similarly it will warn if the output binary contains a\n segment with all three of the read, write and execute permission\n bits set. These warnings are intended to help developers identify\n programs which might be vulnerable to attack via these executable\n memory regions.\n The warnings are enabled by default but can be disabled via a command\n line option. It is also possible to build a linker with the warnings\n disabled, should that be necessary.\n * The ELF linker now supports a --package-metadata option that allows\n embedding a JSON payload in accordance to the Package Metadata\n specification. \n * In linker scripts it is now possible to use TYPE=<type> in an output\n section description to set the section type value.\n * The objdump program now supports coloured/colored syntax\n highlighting of its disassembler output for some architectures.\n (Currently: AVR, RiscV, s390, x86, x86_64).\n * The nm program now supports a --no-weak/-W option to make it ignore\n weak symbols.\n * The readelf and objdump programs now support a -wE option to prevent\n them from attempting to access debuginfod servers when following\n links.\n * The objcopy program's --weaken, --weaken-symbol, and\n --weaken-symbols options now works with unique symbols as well.\n\n- Update to 2.38:\n * elfedit: Add --output-abiversion option to update ABIVERSION.\n * Add support for the LoongArch instruction set.\n * Tools which display symbols or strings (readelf, strings, nm, objdump)\n have a new command line option which controls how unicode characters are\n handled. By default they are treated as normal for the tool. Using\n --unicode=locale will display them according to the current locale.\n Using --unicode=hex will display them as hex byte values, whilst\n --unicode=escape will display them as escape sequences. In addition\n using --unicode=highlight will display them as unicode escape sequences\n highlighted in red (if supported by the output device).\n * readelf -r dumps RELR relative relocations now.\n * Support for efi-app-aarch64, efi-rtdrv-aarch64 and efi-bsdrv-aarch64 has been\n added to objcopy in order to enable UEFI development using binutils.\n * ar: Add --thin for creating thin archives. -T is a deprecated alias without\n diagnostics. In many ar implementations -T has a different meaning, as\n specified by X/Open System Interface.\n * Add support for AArch64 system registers that were missing in previous\n releases.\n * Add support for the LoongArch instruction set.\n * Add a command-line option, -muse-unaligned-vector-move, for x86 target\n to encode aligned vector move as unaligned vector move.\n * Add support for Cortex-R52+ for Arm.\n * Add support for Cortex-A510, Cortex-A710, Cortex-X2 for AArch64.\n * Add support for Cortex-A710 for Arm.\n * Add support for Scalable Matrix Extension (SME) for AArch64.\n * The --multibyte-handling=[allow|warn|warn-sym-only] option tells the\n assembler what to when it encoutners multibyte characters in the input. The\n default is to allow them. Setting the option to 'warn' will generate a\n warning message whenever any multibyte character is encountered. Using the\n option to 'warn-sym-only' will make the assembler generate a warning whenever a\n symbol is defined containing multibyte characters. (References to undefined\n symbols will not generate warnings).\n * Outputs of .ds.x directive and .tfloat directive with hex input from\n x86 assembler have been reduced from 12 bytes to 10 bytes to match the\n output of .tfloat directive.\n * Add support for 'armv8.8-a', 'armv9-a', 'armv9.1-a', 'armv9.2-a' and\n 'armv9.3-a' for -march in AArch64 GAS.\n * Add support for 'armv8.7-a', 'armv8.8-a', 'armv9-a', 'armv9.1-a',\n 'armv9.2-a' and 'armv9.3-a' for -march in Arm GAS.\n * Add support for Intel AVX512_FP16 instructions.\n * Add -z pack-relative-relocs/-z no pack-relative-relocs to x86 ELF\n linker to pack relative relocations in the DT_RELR section.\n * Add support for the LoongArch architecture.\n * Add -z indirect-extern-access/-z noindirect-extern-access to x86 ELF\n linker to control canonical function pointers and copy relocation.\n * Add --max-cache-size=SIZE to set the the maximum cache size to SIZE\n bytes.\n- Explicitly enable --enable-warn-execstack=yes and\t--enable-warn-rwx-segments=yes.\n- Add gprofng subpackage.\n- Include recognition of 'z16' name for 'arch14' on s390. (bsc#1198237).\n- Add back fix for bsc#1191473, which got lost in the update to 2.38.\n- Install symlinks for all target specific tools on arm-eabi-none (bsc#1185712).\n- Enable PRU architecture for AM335x CPU (Beagle Bone Black board)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-4146,SUSE-SLE-Module-Basesystem-15-SP3-2022-4146,SUSE-SLE-Module-Basesystem-15-SP4-2022-4146,SUSE-SLE-Module-Development-Tools-15-SP3-2022-4146,SUSE-SLE-Module-Development-Tools-15-SP4-2022-4146,SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-4146,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4146,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-4146,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-4146,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-4146,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-4146,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-4146,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-4146,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-4146,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-4146,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-4146,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-4146,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-4146,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-4146,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-4146,SUSE-Storage-6-2022-4146,SUSE-Storage-7-2022-4146,openSUSE-SLE-15.3-2022-4146,openSUSE-SLE-15.4-2022-4146", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4146-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:4146-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20224146-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:4146-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013047.html", }, { category: "self", summary: "SUSE Bug 1142579", url: "https://bugzilla.suse.com/1142579", }, { category: "self", summary: "SUSE Bug 1185597", url: "https://bugzilla.suse.com/1185597", }, { category: "self", summary: "SUSE Bug 1185712", url: "https://bugzilla.suse.com/1185712", }, { category: "self", summary: "SUSE Bug 1188374", url: "https://bugzilla.suse.com/1188374", }, { category: "self", summary: "SUSE Bug 1191473", url: "https://bugzilla.suse.com/1191473", }, { category: "self", summary: "SUSE Bug 1193929", url: "https://bugzilla.suse.com/1193929", }, { category: "self", summary: "SUSE Bug 1194783", url: "https://bugzilla.suse.com/1194783", }, { category: "self", summary: "SUSE Bug 1197592", url: "https://bugzilla.suse.com/1197592", }, { category: "self", summary: "SUSE Bug 1198237", url: "https://bugzilla.suse.com/1198237", }, { category: "self", summary: "SUSE Bug 1202816", url: "https://bugzilla.suse.com/1202816", }, { category: "self", summary: "SUSE Bug 1202966", url: "https://bugzilla.suse.com/1202966", }, { category: "self", summary: "SUSE Bug 1202967", url: "https://bugzilla.suse.com/1202967", }, { category: "self", summary: "SUSE Bug 1202969", url: "https://bugzilla.suse.com/1202969", }, { category: "self", summary: "SUSE CVE CVE-2019-1010204 page", url: "https://www.suse.com/security/cve/CVE-2019-1010204/", }, { category: "self", summary: "SUSE CVE CVE-2021-3530 page", url: "https://www.suse.com/security/cve/CVE-2021-3530/", }, { category: "self", summary: "SUSE CVE CVE-2021-3648 page", url: "https://www.suse.com/security/cve/CVE-2021-3648/", }, { category: "self", summary: "SUSE CVE CVE-2021-3826 page", url: "https://www.suse.com/security/cve/CVE-2021-3826/", }, { category: "self", summary: "SUSE CVE CVE-2021-45078 page", url: "https://www.suse.com/security/cve/CVE-2021-45078/", }, { category: "self", summary: "SUSE CVE CVE-2021-46195 page", url: "https://www.suse.com/security/cve/CVE-2021-46195/", }, { category: "self", summary: "SUSE CVE CVE-2022-27943 page", url: "https://www.suse.com/security/cve/CVE-2022-27943/", }, { category: "self", summary: "SUSE CVE CVE-2022-38126 page", url: "https://www.suse.com/security/cve/CVE-2022-38126/", }, { category: "self", summary: "SUSE CVE CVE-2022-38127 page", url: "https://www.suse.com/security/cve/CVE-2022-38127/", }, { category: "self", summary: "SUSE CVE CVE-2022-38533 page", url: "https://www.suse.com/security/cve/CVE-2022-38533/", }, ], title: "Security update for binutils", tracking: { current_release_date: "2022-11-21T08:57:17Z", generator: { date: "2022-11-21T08:57:17Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:4146-1", initial_release_date: "2022-11-21T08:57:17Z", revision_history: [ { date: "2022-11-21T08:57:17Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.39-150100.7.40.1.aarch64", product: { name: "binutils-2.39-150100.7.40.1.aarch64", product_id: "binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "binutils-devel-2.39-150100.7.40.1.aarch64", product: { name: "binutils-devel-2.39-150100.7.40.1.aarch64", product_id: "binutils-devel-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "binutils-gold-2.39-150100.7.40.1.aarch64", product: { name: "binutils-gold-2.39-150100.7.40.1.aarch64", product_id: "binutils-gold-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-arm-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-arm-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-avr-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-avr-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-hppa-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-hppa-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-i386-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-i386-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-i386-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-ia64-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-ia64-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-m68k-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-m68k-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-mips-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-mips-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-ppc-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-ppc-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-rx-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-rx-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-rx-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-s390-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-s390-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-s390x-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-s390x-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-sparc-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-sparc-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-spu-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-spu-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "cross-xtensa-binutils-2.39-150100.7.40.1.aarch64", product: { name: "cross-xtensa-binutils-2.39-150100.7.40.1.aarch64", product_id: "cross-xtensa-binutils-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", product: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", product_id: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, }, { category: "product_version", name: "libctf0-2.39-150100.7.40.1.aarch64", product: { name: "libctf0-2.39-150100.7.40.1.aarch64", product_id: "libctf0-2.39-150100.7.40.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-devel-64bit-2.39-150100.7.40.1.aarch64_ilp32", product: { name: "binutils-devel-64bit-2.39-150100.7.40.1.aarch64_ilp32", product_id: "binutils-devel-64bit-2.39-150100.7.40.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "binutils-2.39-150100.7.40.1.i586", product: { name: "binutils-2.39-150100.7.40.1.i586", product_id: "binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "binutils-devel-2.39-150100.7.40.1.i586", product: { name: "binutils-devel-2.39-150100.7.40.1.i586", product_id: "binutils-devel-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "binutils-gold-2.39-150100.7.40.1.i586", product: { name: "binutils-gold-2.39-150100.7.40.1.i586", product_id: "binutils-gold-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.i586", product_id: "cross-aarch64-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-arm-binutils-2.39-150100.7.40.1.i586", product_id: "cross-arm-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-avr-binutils-2.39-150100.7.40.1.i586", product_id: "cross-avr-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.i586", product_id: "cross-epiphany-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-hppa-binutils-2.39-150100.7.40.1.i586", product_id: "cross-hppa-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.i586", product_id: "cross-hppa64-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-ia64-binutils-2.39-150100.7.40.1.i586", product_id: "cross-ia64-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-m68k-binutils-2.39-150100.7.40.1.i586", product_id: "cross-m68k-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-mips-binutils-2.39-150100.7.40.1.i586", product_id: "cross-mips-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-ppc-binutils-2.39-150100.7.40.1.i586", product_id: "cross-ppc-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.i586", product_id: "cross-ppc64-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.i586", product_id: "cross-ppc64le-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.i586", product_id: "cross-riscv64-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-rx-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-rx-binutils-2.39-150100.7.40.1.i586", product_id: "cross-rx-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-s390-binutils-2.39-150100.7.40.1.i586", product_id: "cross-s390-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-s390x-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-s390x-binutils-2.39-150100.7.40.1.i586", product_id: "cross-s390x-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-sparc-binutils-2.39-150100.7.40.1.i586", product_id: "cross-sparc-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.i586", product_id: "cross-sparc64-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-spu-binutils-2.39-150100.7.40.1.i586", product_id: "cross-spu-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.i586", product_id: "cross-x86_64-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "cross-xtensa-binutils-2.39-150100.7.40.1.i586", product: { name: "cross-xtensa-binutils-2.39-150100.7.40.1.i586", product_id: "cross-xtensa-binutils-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-150100.7.40.1.i586", product: { name: "libctf-nobfd0-2.39-150100.7.40.1.i586", product_id: "libctf-nobfd0-2.39-150100.7.40.1.i586", }, }, { category: "product_version", name: "libctf0-2.39-150100.7.40.1.i586", product: { name: "libctf0-2.39-150100.7.40.1.i586", product_id: "libctf0-2.39-150100.7.40.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "binutils-2.39-150100.7.40.1.ppc64le", product: { name: "binutils-2.39-150100.7.40.1.ppc64le", product_id: "binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.39-150100.7.40.1.ppc64le", product: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le", product_id: "binutils-devel-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "binutils-gold-2.39-150100.7.40.1.ppc64le", product: { name: "binutils-gold-2.39-150100.7.40.1.ppc64le", product_id: "binutils-gold-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-arm-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-arm-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-avr-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-avr-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-i386-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-i386-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-i386-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-mips-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-mips-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-rx-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-rx-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-rx-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-s390-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-s390-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-spu-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-spu-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "cross-xtensa-binutils-2.39-150100.7.40.1.ppc64le", product: { name: "cross-xtensa-binutils-2.39-150100.7.40.1.ppc64le", product_id: "cross-xtensa-binutils-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", product: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", product_id: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, }, { category: "product_version", name: "libctf0-2.39-150100.7.40.1.ppc64le", product: { name: "libctf0-2.39-150100.7.40.1.ppc64le", product_id: "libctf0-2.39-150100.7.40.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.39-150100.7.40.1.s390x", product: { name: "binutils-2.39-150100.7.40.1.s390x", product_id: "binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "binutils-devel-2.39-150100.7.40.1.s390x", product: { name: "binutils-devel-2.39-150100.7.40.1.s390x", product_id: "binutils-devel-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "binutils-gold-2.39-150100.7.40.1.s390x", product: { name: "binutils-gold-2.39-150100.7.40.1.s390x", product_id: "binutils-gold-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-aarch64-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-arm-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-arm-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-avr-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-avr-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-epiphany-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-hppa-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-hppa-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-hppa64-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-i386-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-i386-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-i386-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-ia64-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-ia64-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-m68k-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-m68k-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-mips-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-mips-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-ppc-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-ppc-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-ppc64-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-riscv64-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-rx-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-rx-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-rx-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-s390-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-s390-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-sparc-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-sparc-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-sparc64-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-spu-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-spu-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-x86_64-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-x86_64-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "cross-xtensa-binutils-2.39-150100.7.40.1.s390x", product: { name: "cross-xtensa-binutils-2.39-150100.7.40.1.s390x", product_id: "cross-xtensa-binutils-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-150100.7.40.1.s390x", product: { name: "libctf-nobfd0-2.39-150100.7.40.1.s390x", product_id: "libctf-nobfd0-2.39-150100.7.40.1.s390x", }, }, { category: "product_version", name: "libctf0-2.39-150100.7.40.1.s390x", product: { name: "libctf0-2.39-150100.7.40.1.s390x", product_id: "libctf0-2.39-150100.7.40.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.39-150100.7.40.1.x86_64", product: { name: "binutils-2.39-150100.7.40.1.x86_64", product_id: "binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.39-150100.7.40.1.x86_64", product: { name: "binutils-devel-2.39-150100.7.40.1.x86_64", product_id: "binutils-devel-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", product: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", product_id: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.39-150100.7.40.1.x86_64", product: { name: "binutils-gold-2.39-150100.7.40.1.x86_64", product_id: "binutils-gold-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-arm-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-arm-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-arm-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-avr-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-avr-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-avr-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-hppa-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-hppa-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-hppa-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-i386-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-i386-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-i386-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-ia64-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-ia64-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-ia64-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-m68k-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-m68k-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-m68k-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-mips-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-mips-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-mips-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-ppc-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-ppc-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-ppc-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-rx-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-rx-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-rx-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-s390-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-s390-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-s390-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-s390x-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-s390x-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-s390x-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-sparc-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-sparc-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-sparc-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-spu-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-spu-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-spu-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "cross-xtensa-binutils-2.39-150100.7.40.1.x86_64", product: { name: "cross-xtensa-binutils-2.39-150100.7.40.1.x86_64", product_id: "cross-xtensa-binutils-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", product: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", product_id: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, }, { category: "product_version", name: "libctf0-2.39-150100.7.40.1.x86_64", product: { name: "libctf0-2.39-150100.7.40.1.x86_64", product_id: "libctf0-2.39-150100.7.40.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Package Hub 15 SP4", product: { name: "SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:packagehub:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-devel-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-devel-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-devel-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-devel-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-gold-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-gold-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-gold-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP3", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-gold-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-gold-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-gold-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-gold-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4", product_id: "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-gold-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Package Hub 15 SP4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-devel-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-devel-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-devel-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-devel-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-devel-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-devel-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-devel-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-devel-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-devel-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-devel-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-gold-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-gold-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-gold-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-gold-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-aarch64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-arm-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-arm-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-arm-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-arm-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-arm-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-arm-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-arm-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-arm-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-avr-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-avr-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-avr-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-avr-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-avr-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-avr-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-avr-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-avr-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-epiphany-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-hppa-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-hppa-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-hppa-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-hppa-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-hppa-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-hppa-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-hppa-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-hppa64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-i386-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-i386-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-i386-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-i386-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-i386-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-i386-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-i386-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-i386-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ia64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-ia64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ia64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ia64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-ia64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ia64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-ia64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-m68k-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-m68k-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-m68k-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-m68k-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-m68k-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-m68k-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-m68k-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-mips-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-mips-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-mips-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-mips-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-mips-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-mips-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-mips-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-mips-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-ppc-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-ppc-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-ppc-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-ppc64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-riscv64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-rx-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-rx-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-rx-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-rx-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-rx-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-rx-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-rx-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-rx-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-s390-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-s390-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-s390-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-s390-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-s390-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-s390-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-s390-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-s390-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-s390x-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-s390x-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-s390x-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-s390x-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-s390x-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-sparc-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-sparc-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-sparc-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-sparc-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-sparc-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-sparc-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-sparc-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-sparc64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-spu-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-spu-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-spu-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-spu-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-x86_64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-devel-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-devel-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", }, product_reference: "binutils-gold-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", }, product_reference: "binutils-gold-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", }, product_reference: "binutils-gold-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", }, product_reference: "binutils-gold-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-aarch64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-aarch64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-arm-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-arm-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-arm-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-arm-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-arm-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-arm-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-arm-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-arm-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-avr-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-avr-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-avr-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-avr-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-avr-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-avr-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-avr-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-avr-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-epiphany-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-epiphany-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-hppa-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-hppa-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-hppa-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-hppa-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-hppa-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-hppa-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-hppa-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-hppa64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-hppa64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-i386-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-i386-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-i386-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-i386-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-i386-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-i386-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-i386-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-i386-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ia64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-ia64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ia64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ia64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-ia64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ia64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-ia64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-m68k-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-m68k-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-m68k-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-m68k-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-m68k-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-m68k-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-m68k-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-mips-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-mips-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-mips-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-mips-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-mips-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-mips-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-mips-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-mips-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-ppc-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-ppc-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-ppc-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-ppc64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-riscv64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-riscv64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-rx-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-rx-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-rx-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-rx-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-rx-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-rx-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-rx-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-rx-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-s390-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-s390-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-s390-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-s390-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-s390-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-s390-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-s390-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-s390-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-s390x-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-s390x-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-s390x-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-s390x-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-s390x-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-sparc-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-sparc-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-sparc-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-sparc-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-sparc-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-sparc-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-sparc-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-sparc64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-sparc64-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-spu-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-spu-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-spu-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-spu-binutils-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", }, product_reference: "cross-spu-binutils-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", }, product_reference: "cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", }, product_reference: "cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "cross-x86_64-binutils-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", }, product_reference: "cross-x86_64-binutils-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", }, product_reference: "libctf0-2.39-150100.7.40.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", }, product_reference: "libctf0-2.39-150100.7.40.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", }, product_reference: "libctf0-2.39-150100.7.40.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-150100.7.40.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", }, product_reference: "libctf0-2.39-150100.7.40.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2019-1010204", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010204", }, ], notes: [ { category: "general", text: "GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010204", url: "https://www.suse.com/security/cve/CVE-2019-1010204", }, { category: "external", summary: "SUSE Bug 1142579 for CVE-2019-1010204", url: "https://bugzilla.suse.com/1142579", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "low", }, ], title: "CVE-2019-1010204", }, { cve: "CVE-2021-3530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3530", }, ], notes: [ { category: "general", text: "A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3530", url: "https://www.suse.com/security/cve/CVE-2021-3530", }, { category: "external", summary: "SUSE Bug 1185597 for CVE-2021-3530", url: "https://bugzilla.suse.com/1185597", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "low", }, ], title: "CVE-2021-3530", }, { cve: "CVE-2021-3648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3648", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3530. Reason: This candidate is a reservation duplicate of CVE-2021-3530. Notes: All CVE users should reference CVE-2021-3530 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3648", url: "https://www.suse.com/security/cve/CVE-2021-3648", }, { category: "external", summary: "SUSE Bug 1188374 for CVE-2021-3648", url: "https://bugzilla.suse.com/1188374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "low", }, ], title: "CVE-2021-3648", }, { cve: "CVE-2021-3826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3826", }, ], notes: [ { category: "general", text: "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3826", url: "https://www.suse.com/security/cve/CVE-2021-3826", }, { category: "external", summary: "SUSE Bug 1202969 for CVE-2021-3826", url: "https://bugzilla.suse.com/1202969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "moderate", }, ], title: "CVE-2021-3826", }, { cve: "CVE-2021-45078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45078", }, ], notes: [ { category: "general", text: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45078", url: "https://www.suse.com/security/cve/CVE-2021-45078", }, { category: "external", summary: "SUSE Bug 1193929 for CVE-2021-45078", url: "https://bugzilla.suse.com/1193929", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "moderate", }, ], title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46195", }, ], notes: [ { category: "general", text: "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46195", url: "https://www.suse.com/security/cve/CVE-2021-46195", }, { category: "external", summary: "SUSE Bug 1194783 for CVE-2021-46195", url: "https://bugzilla.suse.com/1194783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "low", }, ], title: "CVE-2021-46195", }, { cve: "CVE-2022-27943", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-27943", }, ], notes: [ { category: "general", text: "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-27943", url: "https://www.suse.com/security/cve/CVE-2022-27943", }, { category: "external", summary: "SUSE Bug 1197592 for CVE-2022-27943", url: "https://bugzilla.suse.com/1197592", }, { category: "external", summary: "SUSE Bug 1205481 for CVE-2022-27943", url: "https://bugzilla.suse.com/1205481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "moderate", }, ], title: "CVE-2022-27943", }, { cve: "CVE-2022-38126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-38126", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-38126", url: "https://www.suse.com/security/cve/CVE-2022-38126", }, { category: "external", summary: "SUSE Bug 1202966 for CVE-2022-38126", url: "https://bugzilla.suse.com/1202966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "moderate", }, ], title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-38127", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-38127", url: "https://www.suse.com/security/cve/CVE-2022-38127", }, { category: "external", summary: "SUSE Bug 1202967 for CVE-2022-38127", url: "https://bugzilla.suse.com/1202967", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "moderate", }, ], title: "CVE-2022-38127", }, { cve: "CVE-2022-38533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-38533", }, ], notes: [ { category: "general", text: "In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-38533", url: "https://www.suse.com/security/cve/CVE-2022-38533", }, { category: "external", summary: "SUSE Bug 1202816 for CVE-2022-38533", url: "https://bugzilla.suse.com/1202816", }, { category: "external", summary: "SUSE Bug 1206168 for CVE-2022-38533", url: "https://bugzilla.suse.com/1206168", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 6:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Enterprise Storage 7:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP3:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Module for Package Hub 15 SP4:binutils-gold-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Proxy 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Retail Branch Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:binutils-devel-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.ppc64le", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.s390x", "SUSE Manager Server 4.1:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.3:libctf0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-devel-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-devel-32bit-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:binutils-gold-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-aarch64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-arm-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-avr-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-epiphany-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-hppa64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-i386-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ia64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-m68k-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-mips-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-ppc64le-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-riscv64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-rx-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-s390-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-s390x-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-sparc64-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:cross-spu-binutils-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:cross-x86_64-binutils-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf-nobfd0-2.39-150100.7.40.1.x86_64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.aarch64", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.ppc64le", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.s390x", "openSUSE Leap 15.4:libctf0-2.39-150100.7.40.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-11-21T08:57:17Z", details: "moderate", }, ], title: "CVE-2022-38533", }, ], }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-11-27 23:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell ECS ist ein Objektspeichersystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-0794 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json", }, { category: "self", summary: "WID-SEC-2024-0794 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794", }, { category: "external", summary: "Dell Security Advisory DSA-2024-141 vom 2024-04-04", url: "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=", }, ], source_lang: "en-US", title: "Dell ECS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-27T23:00:00.000+00:00", generator: { date: "2024-11-28T11:39:04.623+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-0794", initial_release_date: "2024-04-04T22:00:00.000+00:00", revision_history: [ { date: "2024-04-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-27T23:00:00.000+00:00", number: "2", summary: "Produktzuordnung überprüft", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.0", product: { name: "Dell ECS <3.8.1.0", product_id: "T033919", }, }, { category: "product_version", name: "3.8.1.0", product: { name: "Dell ECS 3.8.1.0", product_id: "T033919-fixed", product_identification_helper: { cpe: "cpe:/h:dell:ecs:3.8.1.0", }, }, }, ], category: "product_name", name: "ECS", }, ], category: "vendor", name: "Dell", }, ], }, vulnerabilities: [ { cve: "CVE-2018-18074", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2020-10663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10663", }, { cve: "CVE-2020-10672", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10672", }, { cve: "CVE-2020-10673", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10673", }, { cve: "CVE-2020-10735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10735", }, { cve: "CVE-2020-10968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10968", }, { cve: "CVE-2020-10969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10969", }, { cve: "CVE-2020-11111", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11111", }, { cve: "CVE-2020-11112", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11112", }, { cve: "CVE-2020-11113", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11113", }, { cve: "CVE-2020-11612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11612", }, { cve: "CVE-2020-11619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11619", }, { cve: "CVE-2020-11620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11620", }, { cve: "CVE-2020-11979", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11979", }, { cve: "CVE-2020-12762", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12762", }, { cve: "CVE-2020-12825", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12825", }, { cve: "CVE-2020-13956", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-13956", }, { cve: "CVE-2020-14060", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14060", }, { cve: "CVE-2020-14061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14061", }, { cve: "CVE-2020-14062", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14062", }, { cve: "CVE-2020-14195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14195", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-1945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1945", }, { cve: "CVE-2020-1967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1967", }, { cve: "CVE-2020-1971", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1971", }, { cve: "CVE-2020-24616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24616", }, { cve: "CVE-2020-24750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24750", }, { cve: "CVE-2020-25649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25649", }, { cve: "CVE-2020-25658", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25658", }, { cve: "CVE-2020-26116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26116", }, { cve: "CVE-2020-26137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26137", }, { cve: "CVE-2020-26541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26541", }, { cve: "CVE-2020-27216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27216", }, { cve: "CVE-2020-27218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27218", }, { cve: "CVE-2020-27223", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27223", }, { cve: "CVE-2020-28366", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28366", }, { cve: "CVE-2020-28493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28493", }, { cve: "CVE-2020-29509", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29509", }, { cve: "CVE-2020-29511", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29511", }, { cve: "CVE-2020-29582", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29582", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2020-35490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35490", }, { cve: "CVE-2020-35491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35491", }, { cve: "CVE-2020-35728", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35728", }, { cve: "CVE-2020-36179", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36179", }, { cve: "CVE-2020-36180", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36180", }, { cve: "CVE-2020-36181", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36181", }, { cve: "CVE-2020-36182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36182", }, { cve: "CVE-2020-36183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36183", }, { cve: "CVE-2020-36184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36184", }, { cve: "CVE-2020-36185", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36185", }, { cve: "CVE-2020-36186", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36186", }, { cve: "CVE-2020-36187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36187", }, { cve: "CVE-2020-36188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36188", }, { cve: "CVE-2020-36189", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36189", }, { cve: "CVE-2020-36516", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36516", }, { cve: "CVE-2020-36518", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36518", }, { cve: "CVE-2020-36557", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36557", }, { cve: "CVE-2020-36558", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36558", }, { cve: "CVE-2020-36691", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36691", }, { cve: "CVE-2020-7238", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-7238", }, { cve: "CVE-2020-8840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8840", }, { cve: "CVE-2020-8908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8908", }, { cve: "CVE-2020-8911", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8911", }, { cve: "CVE-2020-8912", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8912", }, { cve: "CVE-2020-9488", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9488", }, { cve: "CVE-2020-9493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9493", }, { cve: "CVE-2020-9546", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9546", }, { cve: "CVE-2020-9547", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9547", }, { cve: "CVE-2020-9548", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9548", }, { cve: "CVE-2021-20190", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20190", }, { cve: "CVE-2021-20323", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20323", }, { cve: "CVE-2021-21290", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21290", }, { cve: "CVE-2021-21295", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21295", }, { cve: "CVE-2021-21409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21409", }, { cve: "CVE-2021-23840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23840", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-2471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-2471", }, { cve: "CVE-2021-25642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-25642", }, { cve: "CVE-2021-26341", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-26341", }, { cve: "CVE-2021-27918", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-27918", }, { cve: "CVE-2021-28153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28153", }, { cve: "CVE-2021-28165", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28165", }, { cve: "CVE-2021-28169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28169", }, { cve: "CVE-2021-28861", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28861", }, { cve: "CVE-2021-29425", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-29425", }, { cve: "CVE-2021-30560", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-30560", }, { cve: "CVE-2021-3114", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3114", }, { cve: "CVE-2021-33036", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33036", }, { cve: "CVE-2021-33194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33194", }, { cve: "CVE-2021-33195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33195", }, { cve: "CVE-2021-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33196", }, { cve: "CVE-2021-33197", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33197", }, { cve: "CVE-2021-33503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33503", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33656", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33656", }, { cve: "CVE-2021-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3424", }, { cve: "CVE-2021-34428", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-34428", }, { cve: "CVE-2021-3449", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3450", }, { cve: "CVE-2021-3530", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3530", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-36373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36373", }, { cve: "CVE-2021-36374", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36374", }, { cve: "CVE-2021-3648", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3648", }, { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3712", }, { cve: "CVE-2021-37136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37136", }, { cve: "CVE-2021-37137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37137", }, { cve: "CVE-2021-37404", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37404", }, { cve: "CVE-2021-37533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37533", }, { cve: "CVE-2021-3754", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3754", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-3826", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3826", }, { cve: "CVE-2021-3827", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3827", }, { cve: "CVE-2021-38297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-38297", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-3923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3923", }, { cve: "CVE-2021-3927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-4104", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4104", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4157", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4157", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4203", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4203", }, { cve: "CVE-2021-42567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-42567", }, { cve: "CVE-2021-43797", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-43797", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44716", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44716", }, { cve: "CVE-2021-44878", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44878", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46195", }, { cve: "CVE-2021-46828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46828", }, { cve: "CVE-2021-46848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46848", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0213", }, { cve: "CVE-2022-0225", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0225", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0561", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1245", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1245", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1466", }, { cve: "CVE-2022-1471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1471", }, { cve: "CVE-2022-1586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1586", }, { cve: "CVE-2022-1587", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1587", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1705", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1729", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1729", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1962", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1962", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-1974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1974", }, { cve: "CVE-2022-1975", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1975", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20368", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20369", }, { cve: "CVE-2022-2047", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2047", }, { cve: "CVE-2022-2048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2048", }, { cve: "CVE-2022-20567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20567", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-21216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21216", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2129", }, { cve: "CVE-2022-21363", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21363", }, { cve: "CVE-2022-21385", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21385", }, { cve: "CVE-2022-21499", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21499", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21540", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21540", }, { cve: "CVE-2022-21541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21541", }, { cve: "CVE-2022-21549", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21549", }, { cve: "CVE-2022-21618", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21618", }, { cve: "CVE-2022-21619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21619", }, { cve: "CVE-2022-21624", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21624", }, { cve: "CVE-2022-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21626", }, { cve: "CVE-2022-21628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21628", }, { cve: "CVE-2022-21702", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21702", }, { cve: "CVE-2022-2175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2231", }, { cve: "CVE-2022-2256", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2256", }, { cve: "CVE-2022-2257", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2287", }, { cve: "CVE-2022-22976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22976", }, { cve: "CVE-2022-22978", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22978", }, { cve: "CVE-2022-2304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2304", }, { cve: "CVE-2022-2318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2318", }, { cve: "CVE-2022-23302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23302", }, { cve: "CVE-2022-23305", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23305", }, { cve: "CVE-2022-23307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23307", }, { cve: "CVE-2022-2343", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2345", }, { cve: "CVE-2022-23471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23471", }, { cve: "CVE-2022-23521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23521", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-24302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24302", }, { cve: "CVE-2022-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24329", }, { cve: "CVE-2022-24823", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24823", }, { cve: "CVE-2022-24903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24903", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-25147", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25147", }, { cve: "CVE-2022-25168", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25168", }, { cve: "CVE-2022-2519", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2519", }, { cve: "CVE-2022-2520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2520", }, { cve: "CVE-2022-2521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2521", }, { cve: "CVE-2022-2522", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2522", }, { cve: "CVE-2022-25647", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25647", }, { cve: "CVE-2022-2571", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2581", }, { cve: "CVE-2022-25857", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25857", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2598", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2598", }, { cve: "CVE-2022-26148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26148", }, { cve: "CVE-2022-26365", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26365", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2639", }, { cve: "CVE-2022-26612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26612", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-27943", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27943", }, { cve: "CVE-2022-2795", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2795", }, { cve: "CVE-2022-28131", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28131", }, { cve: "CVE-2022-2816", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2819", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-2845", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2862", }, { cve: "CVE-2022-2867", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2867", }, { cve: "CVE-2022-2868", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2868", }, { cve: "CVE-2022-2869", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2869", }, { cve: "CVE-2022-28693", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28693", }, { cve: "CVE-2022-2874", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2874", }, { cve: "CVE-2022-28748", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28748", }, { cve: "CVE-2022-2880", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2880", }, { cve: "CVE-2022-2889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2889", }, { cve: "CVE-2022-29162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29162", }, { cve: "CVE-2022-29187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29187", }, { cve: "CVE-2022-2923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2946", }, { cve: "CVE-2022-29526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29526", }, { cve: "CVE-2022-29583", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29583", }, { cve: "CVE-2022-2964", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2964", }, { cve: "CVE-2022-2977", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2977", }, { cve: "CVE-2022-2980", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2982", }, { cve: "CVE-2022-29900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29901", }, { cve: "CVE-2022-2991", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2991", }, { cve: "CVE-2022-3016", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3016", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-3037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3037", }, { cve: "CVE-2022-30580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30580", }, { cve: "CVE-2022-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30630", }, { cve: "CVE-2022-30631", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30631", }, { cve: "CVE-2022-30632", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30632", }, { cve: "CVE-2022-30633", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30633", }, { cve: "CVE-2022-3099", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3099", }, { cve: "CVE-2022-31030", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31030", }, { cve: "CVE-2022-31159", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31159", }, { cve: "CVE-2022-3134", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3153", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-31690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31690", }, { cve: "CVE-2022-32148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32148", }, { cve: "CVE-2022-32149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32149", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-3234", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3235", }, { cve: "CVE-2022-3239", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3239", }, { cve: "CVE-2022-3278", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3297", }, { cve: "CVE-2022-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33196", }, { cve: "CVE-2022-3324", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3352", }, { cve: "CVE-2022-33740", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33740", }, { cve: "CVE-2022-33741", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33741", }, { cve: "CVE-2022-33742", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33742", }, { cve: "CVE-2022-33972", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33972", }, { cve: "CVE-2022-33981", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33981", }, { cve: "CVE-2022-34169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34169", }, { cve: "CVE-2022-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3424", }, { cve: "CVE-2022-34266", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34266", }, { cve: "CVE-2022-34526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34526", }, { cve: "CVE-2022-34903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34903", }, { cve: "CVE-2022-3491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3491", }, { cve: "CVE-2022-3515", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3515", }, { cve: "CVE-2022-3520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3520", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-3542", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3542", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3566", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3566", }, { cve: "CVE-2022-3567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3567", }, { cve: "CVE-2022-35737", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35737", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3591", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3591", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3597", }, { cve: "CVE-2022-3599", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3599", }, { cve: "CVE-2022-36109", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36109", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-3626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3626", }, { cve: "CVE-2022-3627", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3627", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3643", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3643", }, { cve: "CVE-2022-36437", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36437", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-36760", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36760", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-3705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3705", }, { cve: "CVE-2022-37434", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37434", }, { cve: "CVE-2022-37436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37436", }, { cve: "CVE-2022-37865", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37865", }, { cve: "CVE-2022-37866", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37866", }, { cve: "CVE-2022-38090", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38090", }, { cve: "CVE-2022-38096", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38096", }, { cve: "CVE-2022-38126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38127", }, { cve: "CVE-2022-38177", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38177", }, { cve: "CVE-2022-38178", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38178", }, { cve: "CVE-2022-3821", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3821", }, { cve: "CVE-2022-38533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38533", }, { cve: "CVE-2022-38749", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38749", }, { cve: "CVE-2022-38750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38750", }, { cve: "CVE-2022-38751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38751", }, { cve: "CVE-2022-38752", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38752", }, { cve: "CVE-2022-39028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39028", }, { cve: "CVE-2022-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3903", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-39399", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39399", }, { cve: "CVE-2022-3970", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3970", }, { cve: "CVE-2022-40149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40149", }, { cve: "CVE-2022-40150", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40150", }, { cve: "CVE-2022-40151", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40151", }, { cve: "CVE-2022-40152", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40152", }, { cve: "CVE-2022-40153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40153", }, { cve: "CVE-2022-40303", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40303", }, { cve: "CVE-2022-40304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40304", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-40674", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40674", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40899", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40899", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-4141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4141", }, { cve: "CVE-2022-41717", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41717", }, { cve: "CVE-2022-41721", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41721", }, { cve: "CVE-2022-41848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41848", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41854", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41854", }, { cve: "CVE-2022-41858", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41858", }, { cve: "CVE-2022-41881", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41881", }, { cve: "CVE-2022-41903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41903", }, { cve: "CVE-2022-41915", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41915", }, { cve: "CVE-2022-41966", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41966", }, { cve: "CVE-2022-41974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41974", }, { cve: "CVE-2022-42003", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42003", }, { cve: "CVE-2022-42004", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42004", }, { cve: "CVE-2022-42010", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42010", }, { cve: "CVE-2022-42011", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42011", }, { cve: "CVE-2022-42012", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42012", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42889", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42898", }, { cve: "CVE-2022-4292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4292", }, { cve: "CVE-2022-4293", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4293", }, { cve: "CVE-2022-42969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42969", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-43680", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43680", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43945", }, { cve: "CVE-2022-43995", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43995", }, { cve: "CVE-2022-4415", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4415", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-44638", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-44638", }, { cve: "CVE-2022-45061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45061", }, { cve: "CVE-2022-45688", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45688", }, { cve: "CVE-2022-45884", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45887", }, { cve: "CVE-2022-45919", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45934", }, { cve: "CVE-2022-45939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45939", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-46751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46751", }, { cve: "CVE-2022-46908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46908", }, { cve: "CVE-2022-47629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47629", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-48281", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48281", }, { cve: "CVE-2022-48337", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48337", }, { cve: "CVE-2022-48339", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48339", }, { cve: "CVE-2023-0045", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0045", }, { cve: "CVE-2023-0049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0049", }, { cve: "CVE-2023-0051", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0051", }, { cve: "CVE-2023-0054", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0054", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0288", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0288", }, { cve: "CVE-2023-0433", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0433", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0512", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0512", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0597", }, { cve: "CVE-2023-0833", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0833", }, { cve: "CVE-2023-1076", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1076", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1118", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1118", }, { cve: "CVE-2023-1127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1127", }, { cve: "CVE-2023-1170", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1170", }, { cve: "CVE-2023-1175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1175", }, { cve: "CVE-2023-1370", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1370", }, { cve: "CVE-2023-1380", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1380", }, { cve: "CVE-2023-1390", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1390", }, { cve: "CVE-2023-1436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1436", }, { cve: "CVE-2023-1513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1513", }, { cve: "CVE-2023-1611", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1611", }, { cve: "CVE-2023-1670", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1670", }, { cve: "CVE-2023-1855", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1855", }, { cve: "CVE-2023-1989", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1989", }, { cve: "CVE-2023-1990", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1990", }, { cve: "CVE-2023-1998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1998", }, { cve: "CVE-2023-20862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-20862", }, { cve: "CVE-2023-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2124", }, { cve: "CVE-2023-2162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2162", }, { cve: "CVE-2023-2176", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2176", }, { cve: "CVE-2023-21830", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21830", }, { cve: "CVE-2023-21835", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21835", }, { cve: "CVE-2023-21843", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21843", }, { cve: "CVE-2023-21930", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21930", }, { cve: "CVE-2023-21937", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21937", }, { cve: "CVE-2023-21938", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21938", }, { cve: "CVE-2023-21939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21939", }, { cve: "CVE-2023-2194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2194", }, { cve: "CVE-2023-21954", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21954", }, { cve: "CVE-2023-21967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21967", }, { cve: "CVE-2023-21968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21968", }, { cve: "CVE-2023-22490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22490", }, { cve: "CVE-2023-2253", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2253", }, { cve: "CVE-2023-22809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22809", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23946", }, { cve: "CVE-2023-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24329", }, { cve: "CVE-2023-24532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24532", }, { cve: "CVE-2023-24534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24534", }, { cve: "CVE-2023-2483", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2483", }, { cve: "CVE-2023-24998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24998", }, { cve: "CVE-2023-2513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2513", }, { cve: "CVE-2023-25193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25193", }, { cve: "CVE-2023-25652", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25652", }, { cve: "CVE-2023-25690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25690", }, { cve: "CVE-2023-25809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25809", }, { cve: "CVE-2023-25815", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25815", }, { cve: "CVE-2023-26048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26048", }, { cve: "CVE-2023-26049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26049", }, { cve: "CVE-2023-2650", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2650", }, { cve: "CVE-2023-26545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26545", }, { cve: "CVE-2023-26604", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26604", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-27561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27561", }, { cve: "CVE-2023-2828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2828", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-28328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28328", }, { cve: "CVE-2023-28464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28464", }, { cve: "CVE-2023-28486", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28486", }, { cve: "CVE-2023-28487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28487", }, { cve: "CVE-2023-28642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28642", }, { cve: "CVE-2023-28772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28772", }, { cve: "CVE-2023-28840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28840", }, { cve: "CVE-2023-28841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28841", }, { cve: "CVE-2023-28842", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28842", }, { cve: "CVE-2023-29007", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29007", }, { cve: "CVE-2023-29383", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29383", }, { cve: "CVE-2023-29402", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29402", }, { cve: "CVE-2023-29406", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29406", }, { cve: "CVE-2023-29409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29409", }, { cve: "CVE-2023-2976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2976", }, { cve: "CVE-2023-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30630", }, { cve: "CVE-2023-30772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30772", }, { cve: "CVE-2023-31084", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31084", }, { cve: "CVE-2023-3138", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3138", }, { cve: "CVE-2023-31436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31436", }, { cve: "CVE-2023-31484", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31484", }, { cve: "CVE-2023-32269", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32269", }, { cve: "CVE-2023-32697", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32697", }, { cve: "CVE-2023-33264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-33264", }, { cve: "CVE-2023-34034", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34034", }, { cve: "CVE-2023-34035", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34035", }, { cve: "CVE-2023-34453", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34453", }, { cve: "CVE-2023-34454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34454", }, { cve: "CVE-2023-34455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34455", }, { cve: "CVE-2023-34462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34462", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3635", }, { cve: "CVE-2023-36479", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-36479", }, { cve: "CVE-2023-39533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-39533", }, { cve: "CVE-2023-40167", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40167", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-41105", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41105", }, { cve: "CVE-2023-41900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41900", }, { cve: "CVE-2023-43642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43642", }, { cve: "CVE-2023-43804", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43804", }, { cve: "CVE-2023-44487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-44487", }, { cve: "CVE-2023-45803", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-45803", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2024-21626", }, ], }
WID-SEC-W-2022-1124
Vulnerability from csaf_certbund
Published
2021-12-15 23:00
Modified
2023-06-13 22:00
Summary
binutils: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die GNU Binary Utilities sind eine Sammlung von Programmierwerkzeugen für die Erzeugung und Manipulation von Programmen, Objektcode, Bibliotheken, Assemblersprache sowie Quellcode in verschiedenen Dateiformaten
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in binutils ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Die GNU Binary Utilities sind eine Sammlung von Programmierwerkzeugen für die Erzeugung und Manipulation von Programmen, Objektcode, Bibliotheken, Assemblersprache sowie Quellcode in verschiedenen Dateiformaten", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann eine Schwachstelle in binutils ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1124 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-1124.json", }, { category: "self", summary: "WID-SEC-2022-1124 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1124", }, { category: "external", summary: "Ubuntu Security Notice USN-6160-1 vom 2023-06-13", url: "https://ubuntu.com/security/notices/USN-6160-1", }, { category: "external", summary: "NIST Vulnerability Database vom 2021-12-15", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-45078", }, { category: "external", summary: "X-Force-Bericht über Sicherheitslücken", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/215376", }, { category: "external", summary: "Ubuntu Security Notice USN-5341-1 vom 2022-03-22", url: "https://ubuntu.com/security/notices/USN-5341-1", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-30 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-30", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4146-1 vom 2022-11-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013047.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4277-1 vom 2022-11-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013145.html", }, ], source_lang: "en-US", title: "binutils: Schwachstelle ermöglicht Denial of Service", tracking: { current_release_date: "2023-06-13T22:00:00.000+00:00", generator: { date: "2024-08-15T17:33:45.462+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1124", initial_release_date: "2021-12-15T23:00:00.000+00:00", revision_history: [ { date: "2021-12-15T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-12-19T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2021-F2C6802743, FEDORA-2021-3614C0B466", }, { date: "2022-03-22T23:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-11-21T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-11-29T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-06-13T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "7", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source binutils < 2.38", product: { name: "Open Source binutils < 2.38", product_id: "T021342", product_identification_helper: { cpe: "cpe:/a:open_source:binutils:2.38", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-45078", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in binutils. Ursache ist ein Out-of-Bounds-Write-Fehler in der Funktion \"stab_xcoff_builtin_type\" in [stabs.c]. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T002207", "T000126", "T012167", ], }, release_date: "2021-12-15T23:00:00.000+00:00", title: "CVE-2021-45078", }, ], }
WID-SEC-W-2022-0432
Vulnerability from csaf_certbund
Published
2022-06-21 22:00
Modified
2023-04-03 22:00
Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0432 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0432.json", }, { category: "self", summary: "WID-SEC-2022-0432 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0432", }, { category: "external", summary: "XEROX Security Advisory XRX23-005 vom 2023-04-04", url: "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Mini Bulletin XRX21A vom 2022-06-21", url: "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-014-FreeFlow-Print-Server-v9.pdf", }, ], source_lang: "en-US", title: "Xerox FreeFlow Print Server: Mehrere Schwachstellen", tracking: { current_release_date: "2023-04-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:29:02.928+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0432", initial_release_date: "2022-06-21T22:00:00.000+00:00", revision_history: [ { date: "2022-06-21T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-04-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 9", product: { name: "Xerox FreeFlow Print Server 9", product_id: "T002977", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:9", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server v9", product: { name: "Xerox FreeFlow Print Server v9", product_id: "T015632", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:v9", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2016-2124", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2016-2124", }, { cve: "CVE-2019-14822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2019-14822", }, { cve: "CVE-2019-19906", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2019-19906", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-17049", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-17049", }, { cve: "CVE-2020-25717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25717", }, { cve: "CVE-2020-25718", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25718", }, { cve: "CVE-2020-25719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25719", }, { cve: "CVE-2020-25721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25721", }, { cve: "CVE-2020-25722", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25722", }, { cve: "CVE-2020-9484", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-9484", }, { cve: "CVE-2021-21707", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-21707", }, { cve: "CVE-2021-22926", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-22926", }, { cve: "CVE-2021-23192", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-23192", }, { cve: "CVE-2021-27815", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-27815", }, { cve: "CVE-2021-30846", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30846", }, { cve: "CVE-2021-30848", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30848", }, { cve: "CVE-2021-30849", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30849", }, { cve: "CVE-2021-30851", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30851", }, { cve: "CVE-2021-30858", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30858", }, { cve: "CVE-2021-33430", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-33430", }, { cve: "CVE-2021-34141", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-34141", }, { cve: "CVE-2021-35604", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-35604", }, { cve: "CVE-2021-35624", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-35624", }, { cve: "CVE-2021-3572", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3572", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3733", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3733", }, { cve: "CVE-2021-3737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3737", }, { cve: "CVE-2021-3738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3738", }, { cve: "CVE-2021-3770", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3770", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-38115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-38115", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-39212", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39212", }, { cve: "CVE-2021-39272", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39272", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-39920", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39920", }, { cve: "CVE-2021-39921", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39921", }, { cve: "CVE-2021-39922", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39922", }, { cve: "CVE-2021-39923", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39923", }, { cve: "CVE-2021-39924", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39924", }, { cve: "CVE-2021-39925", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39925", }, { cve: "CVE-2021-39926", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39926", }, { cve: "CVE-2021-39928", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39928", }, { cve: "CVE-2021-39929", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39929", }, { cve: "CVE-2021-4008", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4008", }, { cve: "CVE-2021-4009", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4009", }, { cve: "CVE-2021-4010", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4010", }, { cve: "CVE-2021-4011", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4011", }, { cve: "CVE-2021-40145", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-40145", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4034", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4034", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-40812", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-40812", }, { cve: "CVE-2021-41133", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41133", }, { cve: "CVE-2021-4140", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4140", }, { cve: "CVE-2021-41495", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41495", }, { cve: "CVE-2021-41496", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41496", }, { cve: "CVE-2021-4181", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4181", }, { cve: "CVE-2021-41817", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41817", }, { cve: "CVE-2021-41819", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41819", }, { cve: "CVE-2021-4182", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4182", }, { cve: "CVE-2021-4183", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4183", }, { cve: "CVE-2021-4184", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4184", }, { cve: "CVE-2021-4185", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4185", }, { cve: "CVE-2021-42717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-42717", }, { cve: "CVE-2021-42762", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-42762", }, { cve: "CVE-2021-43331", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43331", }, { cve: "CVE-2021-43332", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43332", }, { cve: "CVE-2021-43395", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43395", }, { cve: "CVE-2021-43527", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43527", }, { cve: "CVE-2021-43528", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43528", }, { cve: "CVE-2021-43536", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43536", }, { cve: "CVE-2021-43537", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43537", }, { cve: "CVE-2021-43538", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43538", }, { cve: "CVE-2021-43539", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43539", }, { cve: "CVE-2021-43541", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43541", }, { cve: "CVE-2021-43542", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43542", }, { cve: "CVE-2021-43543", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43543", }, { cve: "CVE-2021-43545", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43545", }, { cve: "CVE-2021-43546", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43546", }, { cve: "CVE-2021-43566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43566", }, { cve: "CVE-2021-43818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43818", }, { cve: "CVE-2021-44142", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44142", }, { cve: "CVE-2021-44224", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44224", }, { cve: "CVE-2021-44227", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44227", }, { cve: "CVE-2021-44420", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44420", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44540", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44540", }, { cve: "CVE-2021-44541", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44541", }, { cve: "CVE-2021-44542", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44542", }, { cve: "CVE-2021-44543", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44543", }, { cve: "CVE-2021-44790", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44790", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-45115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45115", }, { cve: "CVE-2021-45116", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45116", }, { cve: "CVE-2021-45452", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45452", }, { cve: "CVE-2021-45960", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45960", }, { cve: "CVE-2021-46143", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-46143", }, { cve: "CVE-2022-0336", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0336", }, { cve: "CVE-2022-0391", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0391", }, { cve: "CVE-2022-0566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0566", }, { cve: "CVE-2022-0581", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0581", }, { cve: "CVE-2022-0582", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0582", }, { cve: "CVE-2022-0583", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0583", }, { cve: "CVE-2022-0585", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0585", }, { cve: "CVE-2022-0586", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0586", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-21248", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21248", }, { cve: "CVE-2022-21263", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21263", }, { cve: "CVE-2022-21271", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21271", }, { cve: "CVE-2022-21282", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21282", }, { cve: "CVE-2022-21291", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21291", }, { cve: "CVE-2022-21293", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21293", }, { cve: "CVE-2022-21294", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21294", }, { cve: "CVE-2022-21296", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21296", }, { cve: "CVE-2022-21298", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21298", }, { cve: "CVE-2022-21299", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21299", }, { cve: "CVE-2022-21305", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21305", }, { cve: "CVE-2022-21340", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21340", }, { cve: "CVE-2022-21341", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21341", }, { cve: "CVE-2022-21349", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21349", }, { cve: "CVE-2022-21360", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21360", }, { cve: "CVE-2022-21365", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21365", }, { cve: "CVE-2022-21375", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21375", }, { cve: "CVE-2022-21384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21384", }, { cve: "CVE-2022-21416", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21416", }, { cve: "CVE-2022-21446", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21446", }, { cve: "CVE-2022-21461", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21461", }, { cve: "CVE-2022-21463", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21463", }, { cve: "CVE-2022-21493", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21493", }, { cve: "CVE-2022-21494", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21494", }, { cve: "CVE-2022-21712", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21712", }, { cve: "CVE-2022-21716", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21716", }, { cve: "CVE-2022-21824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21824", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22737", }, { cve: "CVE-2022-22738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22738", }, { cve: "CVE-2022-22739", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22739", }, { cve: "CVE-2022-22740", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22740", }, { cve: "CVE-2022-22741", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22741", }, { cve: "CVE-2022-22742", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22742", }, { cve: "CVE-2022-22743", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22743", }, { cve: "CVE-2022-22744", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22744", }, { cve: "CVE-2022-22745", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22745", }, { cve: "CVE-2022-22746", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22746", }, { cve: "CVE-2022-22747", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22747", }, { cve: "CVE-2022-22748", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22748", }, { cve: "CVE-2022-22751", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22751", }, { cve: "CVE-2022-22753", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22753", }, { cve: "CVE-2022-22754", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22754", }, { cve: "CVE-2022-22756", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22756", }, { cve: "CVE-2022-22759", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22759", }, { cve: "CVE-2022-22760", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22760", }, { cve: "CVE-2022-22761", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22761", }, { cve: "CVE-2022-22763", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22763", }, { cve: "CVE-2022-22764", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22764", }, { cve: "CVE-2022-22815", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22815", }, { cve: "CVE-2022-22816", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22816", }, { cve: "CVE-2022-22817", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22817", }, { cve: "CVE-2022-22818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22818", }, { cve: "CVE-2022-22822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22822", }, { cve: "CVE-2022-22823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22823", }, { cve: "CVE-2022-22824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22824", }, { cve: "CVE-2022-22825", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22825", }, { cve: "CVE-2022-22826", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22826", }, { cve: "CVE-2022-22827", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22827", }, { cve: "CVE-2022-23181", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23181", }, { cve: "CVE-2022-23833", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23833", }, { cve: "CVE-2022-23852", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23852", }, { cve: "CVE-2022-23943", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23943", }, { cve: "CVE-2022-23990", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23990", }, { cve: "CVE-2022-24407", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-24407", }, { cve: "CVE-2022-25235", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25235", }, { cve: "CVE-2022-25236", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25236", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-25314", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25314", }, { cve: "CVE-2022-25315", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25315", }, { cve: "CVE-2022-26381", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26381", }, { cve: "CVE-2022-26383", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26383", }, { cve: "CVE-2022-26384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26384", }, { cve: "CVE-2022-26386", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26386", }, { cve: "CVE-2022-26387", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26387", }, { cve: "CVE-2022-26485", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26485", }, { cve: "CVE-2022-26486", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26486", }, ], }
WID-SEC-W-2022-0302
Vulnerability from csaf_certbund
Published
2022-06-14 22:00
Modified
2023-04-03 22:00
Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Administratorrechten
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0302 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0302.json", }, { category: "self", summary: "WID-SEC-2022-0302 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0302", }, { category: "external", summary: "XEROX Security Advisory XRX23-005 vom 2023-04-04", url: "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-015", url: "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-015-FreeFlow-Print-Server-v7.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-013 vom 2022-06-14", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-013-FreeFlow-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-012 vom 2022-06-14", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf", }, ], source_lang: "en-US", title: "Xerox FreeFlow Print Server: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Administratorrechten", tracking: { current_release_date: "2023-04-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:27:55.136+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0302", initial_release_date: "2022-06-14T22:00:00.000+00:00", revision_history: [ { date: "2022-06-14T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-06-21T22:00:00.000+00:00", number: "2", summary: "Neue Updates von XEROX aufgenommen", }, { date: "2023-04-03T22:00:00.000+00:00", number: "3", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 7", product: { name: "Xerox FreeFlow Print Server 7", product_id: "T000872", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:7", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server 9", product: { name: "Xerox FreeFlow Print Server 9", product_id: "T002977", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:9", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2016-2124", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2016-2124", }, { cve: "CVE-2019-14822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2019-14822", }, { cve: "CVE-2019-19906", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2019-19906", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-17049", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-17049", }, { cve: "CVE-2020-25717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25717", }, { cve: "CVE-2020-25718", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25718", }, { cve: "CVE-2020-25719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25719", }, { cve: "CVE-2020-25721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25721", }, { cve: "CVE-2020-25722", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25722", }, { cve: "CVE-2020-9484", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-9484", }, { cve: "CVE-2021-21707", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-21707", }, { cve: "CVE-2021-22926", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-22926", }, { cve: "CVE-2021-23192", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-23192", }, { cve: "CVE-2021-27815", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-27815", }, { cve: "CVE-2021-30846", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30846", }, { cve: "CVE-2021-30848", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30848", }, { cve: "CVE-2021-30849", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30849", }, { cve: "CVE-2021-30851", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30851", }, { cve: "CVE-2021-30858", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30858", }, { cve: "CVE-2021-33430", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-33430", }, { cve: "CVE-2021-34141", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-34141", }, { cve: "CVE-2021-35604", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-35604", }, { cve: "CVE-2021-35624", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-35624", }, { cve: "CVE-2021-3572", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3572", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3733", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3733", }, { cve: "CVE-2021-3737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3737", }, { cve: "CVE-2021-3738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3738", }, { cve: "CVE-2021-3770", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3770", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-38115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-38115", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-39212", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39212", }, { cve: "CVE-2021-39272", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39272", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-39920", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39920", }, { cve: "CVE-2021-39921", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39921", }, { cve: "CVE-2021-39922", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39922", }, { cve: "CVE-2021-39923", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39923", }, { cve: "CVE-2021-39924", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39924", }, { cve: "CVE-2021-39925", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39925", }, { cve: "CVE-2021-39926", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39926", }, { cve: "CVE-2021-39928", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39928", }, { cve: "CVE-2021-39929", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39929", }, { cve: "CVE-2021-4008", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4008", }, { cve: "CVE-2021-4009", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4009", }, { cve: "CVE-2021-4010", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4010", }, { cve: "CVE-2021-4011", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4011", }, { cve: "CVE-2021-40145", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-40145", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4034", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4034", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-40812", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-40812", }, { cve: "CVE-2021-41133", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41133", }, { cve: "CVE-2021-4140", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4140", }, { cve: "CVE-2021-41495", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41495", }, { cve: "CVE-2021-41496", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41496", }, { cve: "CVE-2021-4160", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4160", }, { cve: "CVE-2021-4181", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4181", }, { cve: "CVE-2021-41817", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41817", }, { cve: "CVE-2021-41819", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41819", }, { cve: "CVE-2021-4182", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4182", }, { cve: "CVE-2021-4183", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4183", }, { cve: "CVE-2021-4184", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4184", }, { cve: "CVE-2021-4185", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4185", }, { cve: "CVE-2021-42717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-42717", }, { cve: "CVE-2021-42762", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-42762", }, { cve: "CVE-2021-43331", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43331", }, { cve: "CVE-2021-43332", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43332", }, { cve: "CVE-2021-43395", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43395", }, { cve: "CVE-2021-43527", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43527", }, { cve: "CVE-2021-43528", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43528", }, { cve: "CVE-2021-43536", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43536", }, { cve: "CVE-2021-43537", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43537", }, { cve: "CVE-2021-43538", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43538", }, { cve: "CVE-2021-43539", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43539", }, { cve: "CVE-2021-43541", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43541", }, { cve: "CVE-2021-43542", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43542", }, { cve: "CVE-2021-43543", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43543", }, { cve: "CVE-2021-43545", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43545", }, { cve: "CVE-2021-43546", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43546", }, { cve: "CVE-2021-43566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43566", }, { cve: "CVE-2021-43818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43818", }, { cve: "CVE-2021-44142", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44142", }, { cve: "CVE-2021-44224", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44224", }, { cve: "CVE-2021-44227", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44227", }, { cve: "CVE-2021-44420", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44420", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44540", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44540", }, { cve: "CVE-2021-44541", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44541", }, { cve: "CVE-2021-44542", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44542", }, { cve: "CVE-2021-44543", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44543", }, { cve: "CVE-2021-44790", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44790", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-45115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45115", }, { cve: "CVE-2021-45116", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45116", }, { cve: "CVE-2021-45452", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45452", }, { cve: "CVE-2021-45960", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45960", }, { cve: "CVE-2021-46143", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-46143", }, { cve: "CVE-2022-0336", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0336", }, { cve: "CVE-2022-0391", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0391", }, { cve: "CVE-2022-0566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0566", }, { cve: "CVE-2022-0581", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0581", }, { cve: "CVE-2022-0582", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0582", }, { cve: "CVE-2022-0583", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0583", }, { cve: "CVE-2022-0585", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0585", }, { cve: "CVE-2022-0586", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0586", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-21248", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21248", }, { cve: "CVE-2022-21263", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21263", }, { cve: "CVE-2022-21271", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21271", }, { cve: "CVE-2022-21282", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21282", }, { cve: "CVE-2022-21291", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21291", }, { cve: "CVE-2022-21293", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21293", }, { cve: "CVE-2022-21294", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21294", }, { cve: "CVE-2022-21296", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21296", }, { cve: "CVE-2022-21298", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21298", }, { cve: "CVE-2022-21299", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21299", }, { cve: "CVE-2022-21305", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21305", }, { cve: "CVE-2022-21340", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21340", }, { cve: "CVE-2022-21341", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21341", }, { cve: "CVE-2022-21349", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21349", }, { cve: "CVE-2022-21360", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21360", }, { cve: "CVE-2022-21365", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21365", }, { cve: "CVE-2022-21375", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21375", }, { cve: "CVE-2022-21384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21384", }, { cve: "CVE-2022-21416", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21416", }, { cve: "CVE-2022-21446", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21446", }, { cve: "CVE-2022-21461", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21461", }, { cve: "CVE-2022-21463", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21463", }, { cve: "CVE-2022-21493", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21493", }, { cve: "CVE-2022-21494", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21494", }, { cve: "CVE-2022-21712", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21712", }, { cve: "CVE-2022-21716", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21716", }, { cve: "CVE-2022-21824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21824", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22737", }, { cve: "CVE-2022-22738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22738", }, { cve: "CVE-2022-22739", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22739", }, { cve: "CVE-2022-22740", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22740", }, { cve: "CVE-2022-22741", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22741", }, { cve: "CVE-2022-22742", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22742", }, { cve: "CVE-2022-22743", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22743", }, { cve: "CVE-2022-22744", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22744", }, { cve: "CVE-2022-22745", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22745", }, { cve: "CVE-2022-22746", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22746", }, { cve: "CVE-2022-22747", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22747", }, { cve: "CVE-2022-22748", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22748", }, { cve: "CVE-2022-22751", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22751", }, { cve: "CVE-2022-22753", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22753", }, { cve: "CVE-2022-22754", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22754", }, { cve: "CVE-2022-22756", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22756", }, { cve: "CVE-2022-22759", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22759", }, { cve: "CVE-2022-22760", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22760", }, { cve: "CVE-2022-22761", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22761", }, { cve: "CVE-2022-22763", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22763", }, { cve: "CVE-2022-22764", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22764", }, { cve: "CVE-2022-22815", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22815", }, { cve: "CVE-2022-22816", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22816", }, { cve: "CVE-2022-22817", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22817", }, { cve: "CVE-2022-22818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22818", }, { cve: "CVE-2022-22822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22822", }, { cve: "CVE-2022-22823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22823", }, { cve: "CVE-2022-22824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22824", }, { cve: "CVE-2022-22825", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22825", }, { cve: "CVE-2022-22826", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22826", }, { cve: "CVE-2022-22827", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22827", }, { cve: "CVE-2022-23181", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23181", }, { cve: "CVE-2022-23833", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23833", }, { cve: "CVE-2022-23852", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23852", }, { cve: "CVE-2022-23943", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23943", }, { cve: "CVE-2022-23990", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23990", }, { cve: "CVE-2022-24407", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-24407", }, { cve: "CVE-2022-25235", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25235", }, { cve: "CVE-2022-25236", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25236", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-25314", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25314", }, { cve: "CVE-2022-25315", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25315", }, { cve: "CVE-2022-26381", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26381", }, { cve: "CVE-2022-26383", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26383", }, { cve: "CVE-2022-26384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26384", }, { cve: "CVE-2022-26386", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26386", }, { cve: "CVE-2022-26387", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26387", }, { cve: "CVE-2022-26485", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26485", }, { cve: "CVE-2022-26486", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26486", }, ], }
wid-sec-w-2022-0432
Vulnerability from csaf_certbund
Published
2022-06-21 22:00
Modified
2023-04-03 22:00
Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0432 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0432.json", }, { category: "self", summary: "WID-SEC-2022-0432 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0432", }, { category: "external", summary: "XEROX Security Advisory XRX23-005 vom 2023-04-04", url: "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Mini Bulletin XRX21A vom 2022-06-21", url: "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-014-FreeFlow-Print-Server-v9.pdf", }, ], source_lang: "en-US", title: "Xerox FreeFlow Print Server: Mehrere Schwachstellen", tracking: { current_release_date: "2023-04-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:29:02.928+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0432", initial_release_date: "2022-06-21T22:00:00.000+00:00", revision_history: [ { date: "2022-06-21T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-04-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 9", product: { name: "Xerox FreeFlow Print Server 9", product_id: "T002977", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:9", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server v9", product: { name: "Xerox FreeFlow Print Server v9", product_id: "T015632", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:v9", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2016-2124", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2016-2124", }, { cve: "CVE-2019-14822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2019-14822", }, { cve: "CVE-2019-19906", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2019-19906", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-17049", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-17049", }, { cve: "CVE-2020-25717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25717", }, { cve: "CVE-2020-25718", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25718", }, { cve: "CVE-2020-25719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25719", }, { cve: "CVE-2020-25721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25721", }, { cve: "CVE-2020-25722", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-25722", }, { cve: "CVE-2020-9484", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2020-9484", }, { cve: "CVE-2021-21707", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-21707", }, { cve: "CVE-2021-22926", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-22926", }, { cve: "CVE-2021-23192", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-23192", }, { cve: "CVE-2021-27815", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-27815", }, { cve: "CVE-2021-30846", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30846", }, { cve: "CVE-2021-30848", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30848", }, { cve: "CVE-2021-30849", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30849", }, { cve: "CVE-2021-30851", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30851", }, { cve: "CVE-2021-30858", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-30858", }, { cve: "CVE-2021-33430", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-33430", }, { cve: "CVE-2021-34141", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-34141", }, { cve: "CVE-2021-35604", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-35604", }, { cve: "CVE-2021-35624", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-35624", }, { cve: "CVE-2021-3572", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3572", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3733", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3733", }, { cve: "CVE-2021-3737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3737", }, { cve: "CVE-2021-3738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3738", }, { cve: "CVE-2021-3770", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3770", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-38115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-38115", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-39212", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39212", }, { cve: "CVE-2021-39272", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39272", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-39920", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39920", }, { cve: "CVE-2021-39921", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39921", }, { cve: "CVE-2021-39922", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39922", }, { cve: "CVE-2021-39923", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39923", }, { cve: "CVE-2021-39924", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39924", }, { cve: "CVE-2021-39925", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39925", }, { cve: "CVE-2021-39926", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39926", }, { cve: "CVE-2021-39928", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39928", }, { cve: "CVE-2021-39929", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-39929", }, { cve: "CVE-2021-4008", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4008", }, { cve: "CVE-2021-4009", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4009", }, { cve: "CVE-2021-4010", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4010", }, { cve: "CVE-2021-4011", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4011", }, { cve: "CVE-2021-40145", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-40145", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4034", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4034", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-40812", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-40812", }, { cve: "CVE-2021-41133", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41133", }, { cve: "CVE-2021-4140", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4140", }, { cve: "CVE-2021-41495", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41495", }, { cve: "CVE-2021-41496", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41496", }, { cve: "CVE-2021-4181", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4181", }, { cve: "CVE-2021-41817", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41817", }, { cve: "CVE-2021-41819", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-41819", }, { cve: "CVE-2021-4182", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4182", }, { cve: "CVE-2021-4183", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4183", }, { cve: "CVE-2021-4184", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4184", }, { cve: "CVE-2021-4185", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-4185", }, { cve: "CVE-2021-42717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-42717", }, { cve: "CVE-2021-42762", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-42762", }, { cve: "CVE-2021-43331", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43331", }, { cve: "CVE-2021-43332", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43332", }, { cve: "CVE-2021-43395", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43395", }, { cve: "CVE-2021-43527", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43527", }, { cve: "CVE-2021-43528", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43528", }, { cve: "CVE-2021-43536", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43536", }, { cve: "CVE-2021-43537", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43537", }, { cve: "CVE-2021-43538", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43538", }, { cve: "CVE-2021-43539", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43539", }, { cve: "CVE-2021-43541", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43541", }, { cve: "CVE-2021-43542", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43542", }, { cve: "CVE-2021-43543", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43543", }, { cve: "CVE-2021-43545", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43545", }, { cve: "CVE-2021-43546", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43546", }, { cve: "CVE-2021-43566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43566", }, { cve: "CVE-2021-43818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-43818", }, { cve: "CVE-2021-44142", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44142", }, { cve: "CVE-2021-44224", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44224", }, { cve: "CVE-2021-44227", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44227", }, { cve: "CVE-2021-44420", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44420", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44540", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44540", }, { cve: "CVE-2021-44541", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44541", }, { cve: "CVE-2021-44542", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44542", }, { cve: "CVE-2021-44543", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44543", }, { cve: "CVE-2021-44790", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-44790", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-45115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45115", }, { cve: "CVE-2021-45116", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45116", }, { cve: "CVE-2021-45452", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45452", }, { cve: "CVE-2021-45960", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-45960", }, { cve: "CVE-2021-46143", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2021-46143", }, { cve: "CVE-2022-0336", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0336", }, { cve: "CVE-2022-0391", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0391", }, { cve: "CVE-2022-0566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0566", }, { cve: "CVE-2022-0581", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0581", }, { cve: "CVE-2022-0582", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0582", }, { cve: "CVE-2022-0583", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0583", }, { cve: "CVE-2022-0585", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0585", }, { cve: "CVE-2022-0586", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0586", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-21248", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21248", }, { cve: "CVE-2022-21263", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21263", }, { cve: "CVE-2022-21271", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21271", }, { cve: "CVE-2022-21282", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21282", }, { cve: "CVE-2022-21291", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21291", }, { cve: "CVE-2022-21293", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21293", }, { cve: "CVE-2022-21294", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21294", }, { cve: "CVE-2022-21296", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21296", }, { cve: "CVE-2022-21298", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21298", }, { cve: "CVE-2022-21299", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21299", }, { cve: "CVE-2022-21305", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21305", }, { cve: "CVE-2022-21340", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21340", }, { cve: "CVE-2022-21341", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21341", }, { cve: "CVE-2022-21349", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21349", }, { cve: "CVE-2022-21360", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21360", }, { cve: "CVE-2022-21365", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21365", }, { cve: "CVE-2022-21375", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21375", }, { cve: "CVE-2022-21384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21384", }, { cve: "CVE-2022-21416", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21416", }, { cve: "CVE-2022-21446", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21446", }, { cve: "CVE-2022-21461", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21461", }, { cve: "CVE-2022-21463", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21463", }, { cve: "CVE-2022-21493", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21493", }, { cve: "CVE-2022-21494", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21494", }, { cve: "CVE-2022-21712", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21712", }, { cve: "CVE-2022-21716", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21716", }, { cve: "CVE-2022-21824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-21824", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22737", }, { cve: "CVE-2022-22738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22738", }, { cve: "CVE-2022-22739", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22739", }, { cve: "CVE-2022-22740", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22740", }, { cve: "CVE-2022-22741", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22741", }, { cve: "CVE-2022-22742", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22742", }, { cve: "CVE-2022-22743", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22743", }, { cve: "CVE-2022-22744", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22744", }, { cve: "CVE-2022-22745", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22745", }, { cve: "CVE-2022-22746", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22746", }, { cve: "CVE-2022-22747", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22747", }, { cve: "CVE-2022-22748", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22748", }, { cve: "CVE-2022-22751", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22751", }, { cve: "CVE-2022-22753", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22753", }, { cve: "CVE-2022-22754", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22754", }, { cve: "CVE-2022-22756", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22756", }, { cve: "CVE-2022-22759", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22759", }, { cve: "CVE-2022-22760", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22760", }, { cve: "CVE-2022-22761", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22761", }, { cve: "CVE-2022-22763", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22763", }, { cve: "CVE-2022-22764", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22764", }, { cve: "CVE-2022-22815", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22815", }, { cve: "CVE-2022-22816", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22816", }, { cve: "CVE-2022-22817", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22817", }, { cve: "CVE-2022-22818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22818", }, { cve: "CVE-2022-22822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22822", }, { cve: "CVE-2022-22823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22823", }, { cve: "CVE-2022-22824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22824", }, { cve: "CVE-2022-22825", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22825", }, { cve: "CVE-2022-22826", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22826", }, { cve: "CVE-2022-22827", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-22827", }, { cve: "CVE-2022-23181", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23181", }, { cve: "CVE-2022-23833", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23833", }, { cve: "CVE-2022-23852", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23852", }, { cve: "CVE-2022-23943", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23943", }, { cve: "CVE-2022-23990", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-23990", }, { cve: "CVE-2022-24407", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-24407", }, { cve: "CVE-2022-25235", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25235", }, { cve: "CVE-2022-25236", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25236", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-25314", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25314", }, { cve: "CVE-2022-25315", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-25315", }, { cve: "CVE-2022-26381", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26381", }, { cve: "CVE-2022-26383", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26383", }, { cve: "CVE-2022-26384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26384", }, { cve: "CVE-2022-26386", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26386", }, { cve: "CVE-2022-26387", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26387", }, { cve: "CVE-2022-26485", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26485", }, { cve: "CVE-2022-26486", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen, die im Zusammenhang mit der Solaris Betriebssystem Plattform stehen. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität zu gefährden.", }, ], product_status: { known_affected: [ "T015632", "T002977", ], }, release_date: "2022-06-21T22:00:00.000+00:00", title: "CVE-2022-26486", }, ], }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-11-27 23:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell ECS ist ein Objektspeichersystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-0794 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json", }, { category: "self", summary: "WID-SEC-2024-0794 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794", }, { category: "external", summary: "Dell Security Advisory DSA-2024-141 vom 2024-04-04", url: "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=", }, ], source_lang: "en-US", title: "Dell ECS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-27T23:00:00.000+00:00", generator: { date: "2024-11-28T11:39:04.623+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-0794", initial_release_date: "2024-04-04T22:00:00.000+00:00", revision_history: [ { date: "2024-04-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-27T23:00:00.000+00:00", number: "2", summary: "Produktzuordnung überprüft", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.0", product: { name: "Dell ECS <3.8.1.0", product_id: "T033919", }, }, { category: "product_version", name: "3.8.1.0", product: { name: "Dell ECS 3.8.1.0", product_id: "T033919-fixed", product_identification_helper: { cpe: "cpe:/h:dell:ecs:3.8.1.0", }, }, }, ], category: "product_name", name: "ECS", }, ], category: "vendor", name: "Dell", }, ], }, vulnerabilities: [ { cve: "CVE-2018-18074", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2020-10663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10663", }, { cve: "CVE-2020-10672", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10672", }, { cve: "CVE-2020-10673", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10673", }, { cve: "CVE-2020-10735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10735", }, { cve: "CVE-2020-10968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10968", }, { cve: "CVE-2020-10969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10969", }, { cve: "CVE-2020-11111", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11111", }, { cve: "CVE-2020-11112", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11112", }, { cve: "CVE-2020-11113", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11113", }, { cve: "CVE-2020-11612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11612", }, { cve: "CVE-2020-11619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11619", }, { cve: "CVE-2020-11620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11620", }, { cve: "CVE-2020-11979", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11979", }, { cve: "CVE-2020-12762", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12762", }, { cve: "CVE-2020-12825", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12825", }, { cve: "CVE-2020-13956", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-13956", }, { cve: "CVE-2020-14060", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14060", }, { cve: "CVE-2020-14061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14061", }, { cve: "CVE-2020-14062", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14062", }, { cve: "CVE-2020-14195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14195", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-1945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1945", }, { cve: "CVE-2020-1967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1967", }, { cve: "CVE-2020-1971", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1971", }, { cve: "CVE-2020-24616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24616", }, { cve: "CVE-2020-24750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24750", }, { cve: "CVE-2020-25649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25649", }, { cve: "CVE-2020-25658", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25658", }, { cve: "CVE-2020-26116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26116", }, { cve: "CVE-2020-26137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26137", }, { cve: "CVE-2020-26541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26541", }, { cve: "CVE-2020-27216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27216", }, { cve: "CVE-2020-27218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27218", }, { cve: "CVE-2020-27223", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27223", }, { cve: "CVE-2020-28366", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28366", }, { cve: "CVE-2020-28493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28493", }, { cve: "CVE-2020-29509", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29509", }, { cve: "CVE-2020-29511", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29511", }, { cve: "CVE-2020-29582", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29582", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2020-35490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35490", }, { cve: "CVE-2020-35491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35491", }, { cve: "CVE-2020-35728", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35728", }, { cve: "CVE-2020-36179", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36179", }, { cve: "CVE-2020-36180", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36180", }, { cve: "CVE-2020-36181", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36181", }, { cve: "CVE-2020-36182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36182", }, { cve: "CVE-2020-36183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36183", }, { cve: "CVE-2020-36184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36184", }, { cve: "CVE-2020-36185", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36185", }, { cve: "CVE-2020-36186", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36186", }, { cve: "CVE-2020-36187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36187", }, { cve: "CVE-2020-36188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36188", }, { cve: "CVE-2020-36189", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36189", }, { cve: "CVE-2020-36516", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36516", }, { cve: "CVE-2020-36518", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36518", }, { cve: "CVE-2020-36557", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36557", }, { cve: "CVE-2020-36558", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36558", }, { cve: "CVE-2020-36691", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36691", }, { cve: "CVE-2020-7238", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-7238", }, { cve: "CVE-2020-8840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8840", }, { cve: "CVE-2020-8908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8908", }, { cve: "CVE-2020-8911", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8911", }, { cve: "CVE-2020-8912", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8912", }, { cve: "CVE-2020-9488", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9488", }, { cve: "CVE-2020-9493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9493", }, { cve: "CVE-2020-9546", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9546", }, { cve: "CVE-2020-9547", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9547", }, { cve: "CVE-2020-9548", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9548", }, { cve: "CVE-2021-20190", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20190", }, { cve: "CVE-2021-20323", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20323", }, { cve: "CVE-2021-21290", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21290", }, { cve: "CVE-2021-21295", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21295", }, { cve: "CVE-2021-21409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21409", }, { cve: "CVE-2021-23840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23840", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-2471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-2471", }, { cve: "CVE-2021-25642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-25642", }, { cve: "CVE-2021-26341", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-26341", }, { cve: "CVE-2021-27918", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-27918", }, { cve: "CVE-2021-28153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28153", }, { cve: "CVE-2021-28165", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28165", }, { cve: "CVE-2021-28169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28169", }, { cve: "CVE-2021-28861", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28861", }, { cve: "CVE-2021-29425", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-29425", }, { cve: "CVE-2021-30560", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-30560", }, { cve: "CVE-2021-3114", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3114", }, { cve: "CVE-2021-33036", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33036", }, { cve: "CVE-2021-33194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33194", }, { cve: "CVE-2021-33195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33195", }, { cve: "CVE-2021-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33196", }, { cve: "CVE-2021-33197", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33197", }, { cve: "CVE-2021-33503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33503", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33656", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33656", }, { cve: "CVE-2021-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3424", }, { cve: "CVE-2021-34428", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-34428", }, { cve: "CVE-2021-3449", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3450", }, { cve: "CVE-2021-3530", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3530", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-36373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36373", }, { cve: "CVE-2021-36374", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36374", }, { cve: "CVE-2021-3648", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3648", }, { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3712", }, { cve: "CVE-2021-37136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37136", }, { cve: "CVE-2021-37137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37137", }, { cve: "CVE-2021-37404", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37404", }, { cve: "CVE-2021-37533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37533", }, { cve: "CVE-2021-3754", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3754", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-3826", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3826", }, { cve: "CVE-2021-3827", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3827", }, { cve: "CVE-2021-38297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-38297", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-3923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3923", }, { cve: "CVE-2021-3927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-4104", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4104", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4157", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4157", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4203", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4203", }, { cve: "CVE-2021-42567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-42567", }, { cve: "CVE-2021-43797", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-43797", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44716", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44716", }, { cve: "CVE-2021-44878", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44878", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46195", }, { cve: "CVE-2021-46828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46828", }, { cve: "CVE-2021-46848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46848", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0213", }, { cve: "CVE-2022-0225", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0225", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0561", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1245", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1245", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1466", }, { cve: "CVE-2022-1471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1471", }, { cve: "CVE-2022-1586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1586", }, { cve: "CVE-2022-1587", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1587", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1705", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1729", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1729", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1962", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1962", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-1974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1974", }, { cve: "CVE-2022-1975", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1975", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20368", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20369", }, { cve: "CVE-2022-2047", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2047", }, { cve: "CVE-2022-2048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2048", }, { cve: "CVE-2022-20567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20567", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-21216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21216", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2129", }, { cve: "CVE-2022-21363", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21363", }, { cve: "CVE-2022-21385", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21385", }, { cve: "CVE-2022-21499", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21499", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21540", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21540", }, { cve: "CVE-2022-21541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21541", }, { cve: "CVE-2022-21549", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21549", }, { cve: "CVE-2022-21618", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21618", }, { cve: "CVE-2022-21619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21619", }, { cve: "CVE-2022-21624", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21624", }, { cve: "CVE-2022-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21626", }, { cve: "CVE-2022-21628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21628", }, { cve: "CVE-2022-21702", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21702", }, { cve: "CVE-2022-2175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2231", }, { cve: "CVE-2022-2256", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2256", }, { cve: "CVE-2022-2257", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2287", }, { cve: "CVE-2022-22976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22976", }, { cve: "CVE-2022-22978", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22978", }, { cve: "CVE-2022-2304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2304", }, { cve: "CVE-2022-2318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2318", }, { cve: "CVE-2022-23302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23302", }, { cve: "CVE-2022-23305", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23305", }, { cve: "CVE-2022-23307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23307", }, { cve: "CVE-2022-2343", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2345", }, { cve: "CVE-2022-23471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23471", }, { cve: "CVE-2022-23521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23521", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-24302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24302", }, { cve: "CVE-2022-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24329", }, { cve: "CVE-2022-24823", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24823", }, { cve: "CVE-2022-24903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24903", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-25147", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25147", }, { cve: "CVE-2022-25168", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25168", }, { cve: "CVE-2022-2519", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2519", }, { cve: "CVE-2022-2520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2520", }, { cve: "CVE-2022-2521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2521", }, { cve: "CVE-2022-2522", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2522", }, { cve: "CVE-2022-25647", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25647", }, { cve: "CVE-2022-2571", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2581", }, { cve: "CVE-2022-25857", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25857", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2598", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2598", }, { cve: "CVE-2022-26148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26148", }, { cve: "CVE-2022-26365", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26365", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2639", }, { cve: "CVE-2022-26612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26612", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-27943", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27943", }, { cve: "CVE-2022-2795", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2795", }, { cve: "CVE-2022-28131", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28131", }, { cve: "CVE-2022-2816", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2819", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-2845", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2862", }, { cve: "CVE-2022-2867", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2867", }, { cve: "CVE-2022-2868", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2868", }, { cve: "CVE-2022-2869", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2869", }, { cve: "CVE-2022-28693", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28693", }, { cve: "CVE-2022-2874", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2874", }, { cve: "CVE-2022-28748", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28748", }, { cve: "CVE-2022-2880", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2880", }, { cve: "CVE-2022-2889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2889", }, { cve: "CVE-2022-29162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29162", }, { cve: "CVE-2022-29187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29187", }, { cve: "CVE-2022-2923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2946", }, { cve: "CVE-2022-29526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29526", }, { cve: "CVE-2022-29583", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29583", }, { cve: "CVE-2022-2964", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2964", }, { cve: "CVE-2022-2977", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2977", }, { cve: "CVE-2022-2980", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2982", }, { cve: "CVE-2022-29900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29901", }, { cve: "CVE-2022-2991", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2991", }, { cve: "CVE-2022-3016", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3016", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-3037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3037", }, { cve: "CVE-2022-30580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30580", }, { cve: "CVE-2022-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30630", }, { cve: "CVE-2022-30631", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30631", }, { cve: "CVE-2022-30632", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30632", }, { cve: "CVE-2022-30633", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30633", }, { cve: "CVE-2022-3099", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3099", }, { cve: "CVE-2022-31030", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31030", }, { cve: "CVE-2022-31159", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31159", }, { cve: "CVE-2022-3134", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3153", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-31690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31690", }, { cve: "CVE-2022-32148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32148", }, { cve: "CVE-2022-32149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32149", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-3234", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3235", }, { cve: "CVE-2022-3239", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3239", }, { cve: "CVE-2022-3278", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3297", }, { cve: "CVE-2022-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33196", }, { cve: "CVE-2022-3324", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3352", }, { cve: "CVE-2022-33740", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33740", }, { cve: "CVE-2022-33741", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33741", }, { cve: "CVE-2022-33742", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33742", }, { cve: "CVE-2022-33972", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33972", }, { cve: "CVE-2022-33981", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33981", }, { cve: "CVE-2022-34169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34169", }, { cve: "CVE-2022-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3424", }, { cve: "CVE-2022-34266", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34266", }, { cve: "CVE-2022-34526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34526", }, { cve: "CVE-2022-34903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34903", }, { cve: "CVE-2022-3491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3491", }, { cve: "CVE-2022-3515", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3515", }, { cve: "CVE-2022-3520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3520", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-3542", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3542", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3566", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3566", }, { cve: "CVE-2022-3567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3567", }, { cve: "CVE-2022-35737", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35737", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3591", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3591", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3597", }, { cve: "CVE-2022-3599", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3599", }, { cve: "CVE-2022-36109", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36109", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-3626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3626", }, { cve: "CVE-2022-3627", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3627", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3643", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3643", }, { cve: "CVE-2022-36437", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36437", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-36760", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36760", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-3705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3705", }, { cve: "CVE-2022-37434", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37434", }, { cve: "CVE-2022-37436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37436", }, { cve: "CVE-2022-37865", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37865", }, { cve: "CVE-2022-37866", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37866", }, { cve: "CVE-2022-38090", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38090", }, { cve: "CVE-2022-38096", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38096", }, { cve: "CVE-2022-38126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38127", }, { cve: "CVE-2022-38177", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38177", }, { cve: "CVE-2022-38178", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38178", }, { cve: "CVE-2022-3821", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3821", }, { cve: "CVE-2022-38533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38533", }, { cve: "CVE-2022-38749", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38749", }, { cve: "CVE-2022-38750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38750", }, { cve: "CVE-2022-38751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38751", }, { cve: "CVE-2022-38752", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38752", }, { cve: "CVE-2022-39028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39028", }, { cve: "CVE-2022-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3903", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-39399", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39399", }, { cve: "CVE-2022-3970", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3970", }, { cve: "CVE-2022-40149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40149", }, { cve: "CVE-2022-40150", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40150", }, { cve: "CVE-2022-40151", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40151", }, { cve: "CVE-2022-40152", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40152", }, { cve: "CVE-2022-40153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40153", }, { cve: "CVE-2022-40303", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40303", }, { cve: "CVE-2022-40304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40304", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-40674", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40674", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40899", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40899", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-4141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4141", }, { cve: "CVE-2022-41717", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41717", }, { cve: "CVE-2022-41721", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41721", }, { cve: "CVE-2022-41848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41848", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41854", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41854", }, { cve: "CVE-2022-41858", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41858", }, { cve: "CVE-2022-41881", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41881", }, { cve: "CVE-2022-41903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41903", }, { cve: "CVE-2022-41915", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41915", }, { cve: "CVE-2022-41966", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41966", }, { cve: "CVE-2022-41974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41974", }, { cve: "CVE-2022-42003", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42003", }, { cve: "CVE-2022-42004", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42004", }, { cve: "CVE-2022-42010", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42010", }, { cve: "CVE-2022-42011", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42011", }, { cve: "CVE-2022-42012", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42012", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42889", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42898", }, { cve: "CVE-2022-4292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4292", }, { cve: "CVE-2022-4293", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4293", }, { cve: "CVE-2022-42969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42969", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-43680", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43680", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43945", }, { cve: "CVE-2022-43995", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43995", }, { cve: "CVE-2022-4415", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4415", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-44638", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-44638", }, { cve: "CVE-2022-45061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45061", }, { cve: "CVE-2022-45688", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45688", }, { cve: "CVE-2022-45884", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45887", }, { cve: "CVE-2022-45919", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45934", }, { cve: "CVE-2022-45939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45939", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-46751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46751", }, { cve: "CVE-2022-46908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46908", }, { cve: "CVE-2022-47629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47629", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-48281", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48281", }, { cve: "CVE-2022-48337", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48337", }, { cve: "CVE-2022-48339", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48339", }, { cve: "CVE-2023-0045", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0045", }, { cve: "CVE-2023-0049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0049", }, { cve: "CVE-2023-0051", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0051", }, { cve: "CVE-2023-0054", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0054", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0288", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0288", }, { cve: "CVE-2023-0433", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0433", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0512", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0512", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0597", }, { cve: "CVE-2023-0833", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0833", }, { cve: "CVE-2023-1076", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1076", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1118", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1118", }, { cve: "CVE-2023-1127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1127", }, { cve: "CVE-2023-1170", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1170", }, { cve: "CVE-2023-1175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1175", }, { cve: "CVE-2023-1370", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1370", }, { cve: "CVE-2023-1380", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1380", }, { cve: "CVE-2023-1390", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1390", }, { cve: "CVE-2023-1436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1436", }, { cve: "CVE-2023-1513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1513", }, { cve: "CVE-2023-1611", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1611", }, { cve: "CVE-2023-1670", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1670", }, { cve: "CVE-2023-1855", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1855", }, { cve: "CVE-2023-1989", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1989", }, { cve: "CVE-2023-1990", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1990", }, { cve: "CVE-2023-1998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1998", }, { cve: "CVE-2023-20862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-20862", }, { cve: "CVE-2023-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2124", }, { cve: "CVE-2023-2162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2162", }, { cve: "CVE-2023-2176", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2176", }, { cve: "CVE-2023-21830", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21830", }, { cve: "CVE-2023-21835", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21835", }, { cve: "CVE-2023-21843", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21843", }, { cve: "CVE-2023-21930", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21930", }, { cve: "CVE-2023-21937", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21937", }, { cve: "CVE-2023-21938", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21938", }, { cve: "CVE-2023-21939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21939", }, { cve: "CVE-2023-2194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2194", }, { cve: "CVE-2023-21954", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21954", }, { cve: "CVE-2023-21967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21967", }, { cve: "CVE-2023-21968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21968", }, { cve: "CVE-2023-22490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22490", }, { cve: "CVE-2023-2253", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2253", }, { cve: "CVE-2023-22809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22809", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23946", }, { cve: "CVE-2023-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24329", }, { cve: "CVE-2023-24532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24532", }, { cve: "CVE-2023-24534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24534", }, { cve: "CVE-2023-2483", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2483", }, { cve: "CVE-2023-24998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24998", }, { cve: "CVE-2023-2513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2513", }, { cve: "CVE-2023-25193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25193", }, { cve: "CVE-2023-25652", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25652", }, { cve: "CVE-2023-25690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25690", }, { cve: "CVE-2023-25809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25809", }, { cve: "CVE-2023-25815", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25815", }, { cve: "CVE-2023-26048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26048", }, { cve: "CVE-2023-26049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26049", }, { cve: "CVE-2023-2650", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2650", }, { cve: "CVE-2023-26545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26545", }, { cve: "CVE-2023-26604", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26604", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-27561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27561", }, { cve: "CVE-2023-2828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2828", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-28328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28328", }, { cve: "CVE-2023-28464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28464", }, { cve: "CVE-2023-28486", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28486", }, { cve: "CVE-2023-28487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28487", }, { cve: "CVE-2023-28642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28642", }, { cve: "CVE-2023-28772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28772", }, { cve: "CVE-2023-28840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28840", }, { cve: "CVE-2023-28841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28841", }, { cve: "CVE-2023-28842", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28842", }, { cve: "CVE-2023-29007", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29007", }, { cve: "CVE-2023-29383", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29383", }, { cve: "CVE-2023-29402", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29402", }, { cve: "CVE-2023-29406", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29406", }, { cve: "CVE-2023-29409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29409", }, { cve: "CVE-2023-2976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2976", }, { cve: "CVE-2023-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30630", }, { cve: "CVE-2023-30772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30772", }, { cve: "CVE-2023-31084", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31084", }, { cve: "CVE-2023-3138", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3138", }, { cve: "CVE-2023-31436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31436", }, { cve: "CVE-2023-31484", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31484", }, { cve: "CVE-2023-32269", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32269", }, { cve: "CVE-2023-32697", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32697", }, { cve: "CVE-2023-33264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-33264", }, { cve: "CVE-2023-34034", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34034", }, { cve: "CVE-2023-34035", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34035", }, { cve: "CVE-2023-34453", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34453", }, { cve: "CVE-2023-34454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34454", }, { cve: "CVE-2023-34455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34455", }, { cve: "CVE-2023-34462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34462", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3635", }, { cve: "CVE-2023-36479", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-36479", }, { cve: "CVE-2023-39533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-39533", }, { cve: "CVE-2023-40167", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40167", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-41105", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41105", }, { cve: "CVE-2023-41900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41900", }, { cve: "CVE-2023-43642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43642", }, { cve: "CVE-2023-43804", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43804", }, { cve: "CVE-2023-44487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-44487", }, { cve: "CVE-2023-45803", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-45803", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2024-21626", }, ], }
wid-sec-w-2022-1124
Vulnerability from csaf_certbund
Published
2021-12-15 23:00
Modified
2023-06-13 22:00
Summary
binutils: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die GNU Binary Utilities sind eine Sammlung von Programmierwerkzeugen für die Erzeugung und Manipulation von Programmen, Objektcode, Bibliotheken, Assemblersprache sowie Quellcode in verschiedenen Dateiformaten
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in binutils ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Die GNU Binary Utilities sind eine Sammlung von Programmierwerkzeugen für die Erzeugung und Manipulation von Programmen, Objektcode, Bibliotheken, Assemblersprache sowie Quellcode in verschiedenen Dateiformaten", title: "Produktbeschreibung", }, { category: "summary", text: "Ein lokaler Angreifer kann eine Schwachstelle in binutils ausnutzen, um einen Denial of Service Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1124 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-1124.json", }, { category: "self", summary: "WID-SEC-2022-1124 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1124", }, { category: "external", summary: "Ubuntu Security Notice USN-6160-1 vom 2023-06-13", url: "https://ubuntu.com/security/notices/USN-6160-1", }, { category: "external", summary: "NIST Vulnerability Database vom 2021-12-15", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-45078", }, { category: "external", summary: "X-Force-Bericht über Sicherheitslücken", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/215376", }, { category: "external", summary: "Ubuntu Security Notice USN-5341-1 vom 2022-03-22", url: "https://ubuntu.com/security/notices/USN-5341-1", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-30 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-30", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4146-1 vom 2022-11-21", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013047.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4277-1 vom 2022-11-29", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013145.html", }, ], source_lang: "en-US", title: "binutils: Schwachstelle ermöglicht Denial of Service", tracking: { current_release_date: "2023-06-13T22:00:00.000+00:00", generator: { date: "2024-08-15T17:33:45.462+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1124", initial_release_date: "2021-12-15T23:00:00.000+00:00", revision_history: [ { date: "2021-12-15T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2021-12-19T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2021-F2C6802743, FEDORA-2021-3614C0B466", }, { date: "2022-03-22T23:00:00.000+00:00", number: "3", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-11-21T23:00:00.000+00:00", number: "5", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-11-29T23:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-06-13T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Ubuntu aufgenommen", }, ], status: "final", version: "7", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source binutils < 2.38", product: { name: "Open Source binutils < 2.38", product_id: "T021342", product_identification_helper: { cpe: "cpe:/a:open_source:binutils:2.38", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2021-45078", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in binutils. Ursache ist ein Out-of-Bounds-Write-Fehler in der Funktion \"stab_xcoff_builtin_type\" in [stabs.c]. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.", }, ], product_status: { known_affected: [ "T002207", "T000126", "T012167", ], }, release_date: "2021-12-15T23:00:00.000+00:00", title: "CVE-2021-45078", }, ], }
wid-sec-w-2022-0302
Vulnerability from csaf_certbund
Published
2022-06-14 22:00
Modified
2023-04-03 22:00
Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Administratorrechten
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0302 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0302.json", }, { category: "self", summary: "WID-SEC-2022-0302 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0302", }, { category: "external", summary: "XEROX Security Advisory XRX23-005 vom 2023-04-04", url: "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-015", url: "https://security.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-015-FreeFlow-Print-Server-v7.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-013 vom 2022-06-14", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-013-FreeFlow-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-012 vom 2022-06-14", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2022/06/Xerox-Security-Bulletin-XRX22-012-FreeFlow-Printer.pdf", }, ], source_lang: "en-US", title: "Xerox FreeFlow Print Server: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Administratorrechten", tracking: { current_release_date: "2023-04-03T22:00:00.000+00:00", generator: { date: "2024-08-15T17:27:55.136+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0302", initial_release_date: "2022-06-14T22:00:00.000+00:00", revision_history: [ { date: "2022-06-14T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-06-21T22:00:00.000+00:00", number: "2", summary: "Neue Updates von XEROX aufgenommen", }, { date: "2023-04-03T22:00:00.000+00:00", number: "3", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 7", product: { name: "Xerox FreeFlow Print Server 7", product_id: "T000872", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:7", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server 9", product: { name: "Xerox FreeFlow Print Server 9", product_id: "T002977", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:9", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2016-2124", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2016-2124", }, { cve: "CVE-2019-14822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2019-14822", }, { cve: "CVE-2019-19906", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2019-19906", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-17049", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-17049", }, { cve: "CVE-2020-25717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25717", }, { cve: "CVE-2020-25718", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25718", }, { cve: "CVE-2020-25719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25719", }, { cve: "CVE-2020-25721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25721", }, { cve: "CVE-2020-25722", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-25722", }, { cve: "CVE-2020-9484", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2020-9484", }, { cve: "CVE-2021-21707", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-21707", }, { cve: "CVE-2021-22926", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-22926", }, { cve: "CVE-2021-23192", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-23192", }, { cve: "CVE-2021-27815", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-27815", }, { cve: "CVE-2021-30846", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30846", }, { cve: "CVE-2021-30848", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30848", }, { cve: "CVE-2021-30849", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30849", }, { cve: "CVE-2021-30851", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30851", }, { cve: "CVE-2021-30858", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-30858", }, { cve: "CVE-2021-33430", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-33430", }, { cve: "CVE-2021-34141", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-34141", }, { cve: "CVE-2021-35604", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-35604", }, { cve: "CVE-2021-35624", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-35624", }, { cve: "CVE-2021-3572", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3572", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3733", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3733", }, { cve: "CVE-2021-3737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3737", }, { cve: "CVE-2021-3738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3738", }, { cve: "CVE-2021-3770", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3770", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-38115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-38115", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-39212", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39212", }, { cve: "CVE-2021-39272", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39272", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-39920", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39920", }, { cve: "CVE-2021-39921", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39921", }, { cve: "CVE-2021-39922", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39922", }, { cve: "CVE-2021-39923", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39923", }, { cve: "CVE-2021-39924", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39924", }, { cve: "CVE-2021-39925", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39925", }, { cve: "CVE-2021-39926", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39926", }, { cve: "CVE-2021-39928", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39928", }, { cve: "CVE-2021-39929", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-39929", }, { cve: "CVE-2021-4008", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4008", }, { cve: "CVE-2021-4009", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4009", }, { cve: "CVE-2021-4010", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4010", }, { cve: "CVE-2021-4011", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4011", }, { cve: "CVE-2021-40145", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-40145", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4034", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4034", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-40812", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-40812", }, { cve: "CVE-2021-41133", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41133", }, { cve: "CVE-2021-4140", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4140", }, { cve: "CVE-2021-41495", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41495", }, { cve: "CVE-2021-41496", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41496", }, { cve: "CVE-2021-4160", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4160", }, { cve: "CVE-2021-4181", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4181", }, { cve: "CVE-2021-41817", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41817", }, { cve: "CVE-2021-41819", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-41819", }, { cve: "CVE-2021-4182", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4182", }, { cve: "CVE-2021-4183", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4183", }, { cve: "CVE-2021-4184", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4184", }, { cve: "CVE-2021-4185", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-4185", }, { cve: "CVE-2021-42717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-42717", }, { cve: "CVE-2021-42762", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-42762", }, { cve: "CVE-2021-43331", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43331", }, { cve: "CVE-2021-43332", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43332", }, { cve: "CVE-2021-43395", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43395", }, { cve: "CVE-2021-43527", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43527", }, { cve: "CVE-2021-43528", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43528", }, { cve: "CVE-2021-43536", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43536", }, { cve: "CVE-2021-43537", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43537", }, { cve: "CVE-2021-43538", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43538", }, { cve: "CVE-2021-43539", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43539", }, { cve: "CVE-2021-43541", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43541", }, { cve: "CVE-2021-43542", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43542", }, { cve: "CVE-2021-43543", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43543", }, { cve: "CVE-2021-43545", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43545", }, { cve: "CVE-2021-43546", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43546", }, { cve: "CVE-2021-43566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43566", }, { cve: "CVE-2021-43818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-43818", }, { cve: "CVE-2021-44142", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44142", }, { cve: "CVE-2021-44224", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44224", }, { cve: "CVE-2021-44227", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44227", }, { cve: "CVE-2021-44420", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44420", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44540", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44540", }, { cve: "CVE-2021-44541", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44541", }, { cve: "CVE-2021-44542", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44542", }, { cve: "CVE-2021-44543", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44543", }, { cve: "CVE-2021-44790", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-44790", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-45115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45115", }, { cve: "CVE-2021-45116", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45116", }, { cve: "CVE-2021-45452", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45452", }, { cve: "CVE-2021-45960", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-45960", }, { cve: "CVE-2021-46143", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2021-46143", }, { cve: "CVE-2022-0336", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0336", }, { cve: "CVE-2022-0391", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0391", }, { cve: "CVE-2022-0566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0566", }, { cve: "CVE-2022-0581", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0581", }, { cve: "CVE-2022-0582", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0582", }, { cve: "CVE-2022-0583", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0583", }, { cve: "CVE-2022-0585", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0585", }, { cve: "CVE-2022-0586", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0586", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-21248", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21248", }, { cve: "CVE-2022-21263", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21263", }, { cve: "CVE-2022-21271", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21271", }, { cve: "CVE-2022-21282", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21282", }, { cve: "CVE-2022-21291", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21291", }, { cve: "CVE-2022-21293", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21293", }, { cve: "CVE-2022-21294", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21294", }, { cve: "CVE-2022-21296", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21296", }, { cve: "CVE-2022-21298", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21298", }, { cve: "CVE-2022-21299", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21299", }, { cve: "CVE-2022-21305", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21305", }, { cve: "CVE-2022-21340", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21340", }, { cve: "CVE-2022-21341", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21341", }, { cve: "CVE-2022-21349", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21349", }, { cve: "CVE-2022-21360", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21360", }, { cve: "CVE-2022-21365", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21365", }, { cve: "CVE-2022-21375", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21375", }, { cve: "CVE-2022-21384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21384", }, { cve: "CVE-2022-21416", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21416", }, { cve: "CVE-2022-21446", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21446", }, { cve: "CVE-2022-21461", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21461", }, { cve: "CVE-2022-21463", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21463", }, { cve: "CVE-2022-21493", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21493", }, { cve: "CVE-2022-21494", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21494", }, { cve: "CVE-2022-21712", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21712", }, { cve: "CVE-2022-21716", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21716", }, { cve: "CVE-2022-21824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-21824", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22737", }, { cve: "CVE-2022-22738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22738", }, { cve: "CVE-2022-22739", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22739", }, { cve: "CVE-2022-22740", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22740", }, { cve: "CVE-2022-22741", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22741", }, { cve: "CVE-2022-22742", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22742", }, { cve: "CVE-2022-22743", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22743", }, { cve: "CVE-2022-22744", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22744", }, { cve: "CVE-2022-22745", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22745", }, { cve: "CVE-2022-22746", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22746", }, { cve: "CVE-2022-22747", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22747", }, { cve: "CVE-2022-22748", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22748", }, { cve: "CVE-2022-22751", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22751", }, { cve: "CVE-2022-22753", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22753", }, { cve: "CVE-2022-22754", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22754", }, { cve: "CVE-2022-22756", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22756", }, { cve: "CVE-2022-22759", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22759", }, { cve: "CVE-2022-22760", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22760", }, { cve: "CVE-2022-22761", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22761", }, { cve: "CVE-2022-22763", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22763", }, { cve: "CVE-2022-22764", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22764", }, { cve: "CVE-2022-22815", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22815", }, { cve: "CVE-2022-22816", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22816", }, { cve: "CVE-2022-22817", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22817", }, { cve: "CVE-2022-22818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22818", }, { cve: "CVE-2022-22822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22822", }, { cve: "CVE-2022-22823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22823", }, { cve: "CVE-2022-22824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22824", }, { cve: "CVE-2022-22825", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22825", }, { cve: "CVE-2022-22826", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22826", }, { cve: "CVE-2022-22827", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-22827", }, { cve: "CVE-2022-23181", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23181", }, { cve: "CVE-2022-23833", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23833", }, { cve: "CVE-2022-23852", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23852", }, { cve: "CVE-2022-23943", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23943", }, { cve: "CVE-2022-23990", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-23990", }, { cve: "CVE-2022-24407", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-24407", }, { cve: "CVE-2022-25235", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25235", }, { cve: "CVE-2022-25236", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25236", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-25314", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25314", }, { cve: "CVE-2022-25315", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-25315", }, { cve: "CVE-2022-26381", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26381", }, { cve: "CVE-2022-26383", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26383", }, { cve: "CVE-2022-26384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26384", }, { cve: "CVE-2022-26386", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26386", }, { cve: "CVE-2022-26387", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26387", }, { cve: "CVE-2022-26485", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26485", }, { cve: "CVE-2022-26486", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder Dateien zu manipulieren.", }, ], product_status: { known_affected: [ "T000872", "T002977", ], }, release_date: "2022-06-14T22:00:00.000+00:00", title: "CVE-2022-26486", }, ], }
fkie_cve-2021-45078
Vulnerability from fkie_nvd
Published
2021-12-15 20:15
Modified
2024-11-21 06:31
Severity ?
Summary
stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | binutils | * | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 | |
redhat | enterprise_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
netapp | ontap_select_deploy_administration_utility | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", matchCriteriaId: "9C5537A9-DB91-42A6-BA36-70AF3883D1FE", versionEndIncluding: "2.37", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "FA6FEEC2-9F11-4643-8827-749718254FED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", matchCriteriaId: "E7CF3019-975D-40BB-A8A4-894E62BD3797", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", }, { lang: "es", value: "La función stab_xcoff_builtin_type en el archivo stabs.c en GNU Binutils versiones hasta 2.37, permite a atacantes causar una denegación de servicio (desbordamiento de búfer basado en la pila) o posiblemente tener otro impacto no especificado, como lo demuestra una escritura fuera de límites. NOTA: este problema se presenta debido a una corrección incorrecta de CVE-2018-12699", }, ], id: "CVE-2021-45078", lastModified: "2024-11-21T06:31:54.293", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-12-15T20:15:08.797", references: [ { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-30", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220107-0002/", }, { source: "cve@mitre.org", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", }, { source: "cve@mitre.org", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=161e87d12167b1e36193385485c1f6ce92f74f02", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-30", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220107-0002/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=161e87d12167b1e36193385485c1f6ce92f74f02", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2021-45078
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.
Aliases
Aliases
{ GSD: { alias: "CVE-2021-45078", description: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", id: "GSD-2021-45078", references: [ "https://www.suse.com/security/cve/CVE-2021-45078.html", "https://ubuntu.com/security/CVE-2021-45078", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-45078", ], details: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", id: "GSD-2021-45078", modified: "2023-12-13T01:23:19.568694Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-45078", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", refsource: "MISC", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", }, { name: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02", refsource: "MISC", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02", }, { name: "FEDORA-2021-f2c6802743", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/", }, { name: "FEDORA-2021-3614c0b466", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/", }, { name: "https://security.netapp.com/advisory/ntap-20220107-0002/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20220107-0002/", }, { name: "GLSA-202208-30", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-30", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.37", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-45078", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-787", }, ], }, ], }, references: { reference_data: [ { name: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", refsource: "MISC", tags: [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", }, { name: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02", }, { name: "FEDORA-2021-3614c0b466", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/", }, { name: "FEDORA-2021-f2c6802743", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/", }, { name: "https://security.netapp.com/advisory/ntap-20220107-0002/", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20220107-0002/", }, { name: "GLSA-202208-30", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-30", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2022-09-28T19:54Z", publishedDate: "2021-12-15T20:15Z", }, }, }
opensuse-su-2024:12631-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
binutils-2.39-2.1 on GA media
Notes
Title of the patch
binutils-2.39-2.1 on GA media
Description of the patch
These are all security issues fixed in the binutils-2.39-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12631
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "binutils-2.39-2.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the binutils-2.39-2.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-12631", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12631-1.json", }, { category: "self", summary: "SUSE CVE CVE-2021-3648 page", url: "https://www.suse.com/security/cve/CVE-2021-3648/", }, { category: "self", summary: "SUSE CVE CVE-2021-3826 page", url: "https://www.suse.com/security/cve/CVE-2021-3826/", }, { category: "self", summary: "SUSE CVE CVE-2021-45078 page", url: "https://www.suse.com/security/cve/CVE-2021-45078/", }, { category: "self", summary: "SUSE CVE CVE-2021-46195 page", url: "https://www.suse.com/security/cve/CVE-2021-46195/", }, { category: "self", summary: "SUSE CVE CVE-2022-27943 page", url: "https://www.suse.com/security/cve/CVE-2022-27943/", }, { category: "self", summary: "SUSE CVE CVE-2022-38126 page", url: "https://www.suse.com/security/cve/CVE-2022-38126/", }, { category: "self", summary: "SUSE CVE CVE-2022-38127 page", url: "https://www.suse.com/security/cve/CVE-2022-38127/", }, { category: "self", summary: "SUSE CVE CVE-2022-38533 page", url: "https://www.suse.com/security/cve/CVE-2022-38533/", }, ], title: "binutils-2.39-2.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:12631-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "binutils-2.39-2.1.aarch64", product: { name: "binutils-2.39-2.1.aarch64", product_id: "binutils-2.39-2.1.aarch64", }, }, { category: "product_version", name: "binutils-devel-2.39-2.1.aarch64", product: { name: "binutils-devel-2.39-2.1.aarch64", product_id: "binutils-devel-2.39-2.1.aarch64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.39-2.1.aarch64", product: { name: "binutils-devel-32bit-2.39-2.1.aarch64", product_id: "binutils-devel-32bit-2.39-2.1.aarch64", }, }, { category: "product_version", name: "binutils-gold-2.39-2.1.aarch64", product: { name: "binutils-gold-2.39-2.1.aarch64", product_id: "binutils-gold-2.39-2.1.aarch64", }, }, { category: "product_version", name: "gprofng-2.39-2.1.aarch64", product: { name: "gprofng-2.39-2.1.aarch64", product_id: "gprofng-2.39-2.1.aarch64", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-2.1.aarch64", product: { name: "libctf-nobfd0-2.39-2.1.aarch64", product_id: "libctf-nobfd0-2.39-2.1.aarch64", }, }, { category: "product_version", name: "libctf0-2.39-2.1.aarch64", product: { name: "libctf0-2.39-2.1.aarch64", product_id: "libctf0-2.39-2.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "binutils-2.39-2.1.ppc64le", product: { name: "binutils-2.39-2.1.ppc64le", product_id: "binutils-2.39-2.1.ppc64le", }, }, { category: "product_version", name: "binutils-devel-2.39-2.1.ppc64le", product: { name: "binutils-devel-2.39-2.1.ppc64le", product_id: "binutils-devel-2.39-2.1.ppc64le", }, }, { category: "product_version", name: "binutils-devel-32bit-2.39-2.1.ppc64le", product: { name: "binutils-devel-32bit-2.39-2.1.ppc64le", product_id: "binutils-devel-32bit-2.39-2.1.ppc64le", }, }, { category: "product_version", name: "binutils-gold-2.39-2.1.ppc64le", product: { name: "binutils-gold-2.39-2.1.ppc64le", product_id: "binutils-gold-2.39-2.1.ppc64le", }, }, { category: "product_version", name: "gprofng-2.39-2.1.ppc64le", product: { name: "gprofng-2.39-2.1.ppc64le", product_id: "gprofng-2.39-2.1.ppc64le", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-2.1.ppc64le", product: { name: "libctf-nobfd0-2.39-2.1.ppc64le", product_id: "libctf-nobfd0-2.39-2.1.ppc64le", }, }, { category: "product_version", name: "libctf0-2.39-2.1.ppc64le", product: { name: "libctf0-2.39-2.1.ppc64le", product_id: "libctf0-2.39-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "binutils-2.39-2.1.s390x", product: { name: "binutils-2.39-2.1.s390x", product_id: "binutils-2.39-2.1.s390x", }, }, { category: "product_version", name: "binutils-devel-2.39-2.1.s390x", product: { name: "binutils-devel-2.39-2.1.s390x", product_id: "binutils-devel-2.39-2.1.s390x", }, }, { category: "product_version", name: "binutils-devel-32bit-2.39-2.1.s390x", product: { name: "binutils-devel-32bit-2.39-2.1.s390x", product_id: "binutils-devel-32bit-2.39-2.1.s390x", }, }, { category: "product_version", name: "binutils-gold-2.39-2.1.s390x", product: { name: "binutils-gold-2.39-2.1.s390x", product_id: "binutils-gold-2.39-2.1.s390x", }, }, { category: "product_version", name: "gprofng-2.39-2.1.s390x", product: { name: "gprofng-2.39-2.1.s390x", product_id: "gprofng-2.39-2.1.s390x", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-2.1.s390x", product: { name: "libctf-nobfd0-2.39-2.1.s390x", product_id: "libctf-nobfd0-2.39-2.1.s390x", }, }, { category: "product_version", name: "libctf0-2.39-2.1.s390x", product: { name: "libctf0-2.39-2.1.s390x", product_id: "libctf0-2.39-2.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "binutils-2.39-2.1.x86_64", product: { name: "binutils-2.39-2.1.x86_64", product_id: "binutils-2.39-2.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-2.39-2.1.x86_64", product: { name: "binutils-devel-2.39-2.1.x86_64", product_id: "binutils-devel-2.39-2.1.x86_64", }, }, { category: "product_version", name: "binutils-devel-32bit-2.39-2.1.x86_64", product: { name: "binutils-devel-32bit-2.39-2.1.x86_64", product_id: "binutils-devel-32bit-2.39-2.1.x86_64", }, }, { category: "product_version", name: "binutils-gold-2.39-2.1.x86_64", product: { name: "binutils-gold-2.39-2.1.x86_64", product_id: "binutils-gold-2.39-2.1.x86_64", }, }, { category: "product_version", name: "gprofng-2.39-2.1.x86_64", product: { name: "gprofng-2.39-2.1.x86_64", product_id: "gprofng-2.39-2.1.x86_64", }, }, { category: "product_version", name: "libctf-nobfd0-2.39-2.1.x86_64", product: { name: "libctf-nobfd0-2.39-2.1.x86_64", product_id: "libctf-nobfd0-2.39-2.1.x86_64", }, }, { category: "product_version", name: "libctf0-2.39-2.1.x86_64", product: { name: "libctf0-2.39-2.1.x86_64", product_id: "libctf0-2.39-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "binutils-2.39-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", }, product_reference: "binutils-2.39-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", }, product_reference: "binutils-2.39-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", }, product_reference: "binutils-2.39-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-2.39-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", }, product_reference: "binutils-2.39-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", }, product_reference: "binutils-devel-2.39-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", }, product_reference: "binutils-devel-2.39-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", }, product_reference: "binutils-devel-2.39-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-2.39-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", }, product_reference: "binutils-devel-2.39-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", }, product_reference: "binutils-devel-32bit-2.39-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", }, product_reference: "binutils-devel-32bit-2.39-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", }, product_reference: "binutils-devel-32bit-2.39-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-devel-32bit-2.39-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", }, product_reference: "binutils-devel-32bit-2.39-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", }, product_reference: "binutils-gold-2.39-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", }, product_reference: "binutils-gold-2.39-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", }, product_reference: "binutils-gold-2.39-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "binutils-gold-2.39-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", }, product_reference: "binutils-gold-2.39-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gprofng-2.39-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", }, product_reference: "gprofng-2.39-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gprofng-2.39-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", }, product_reference: "gprofng-2.39-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gprofng-2.39-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", }, product_reference: "gprofng-2.39-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gprofng-2.39-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", }, product_reference: "gprofng-2.39-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", }, product_reference: "libctf-nobfd0-2.39-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", }, product_reference: "libctf-nobfd0-2.39-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", }, product_reference: "libctf-nobfd0-2.39-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf-nobfd0-2.39-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", }, product_reference: "libctf-nobfd0-2.39-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", }, product_reference: "libctf0-2.39-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", }, product_reference: "libctf0-2.39-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", }, product_reference: "libctf0-2.39-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libctf0-2.39-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", }, product_reference: "libctf0-2.39-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2021-3648", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3648", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3530. Reason: This candidate is a reservation duplicate of CVE-2021-3530. Notes: All CVE users should reference CVE-2021-3530 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3648", url: "https://www.suse.com/security/cve/CVE-2021-3648", }, { category: "external", summary: "SUSE Bug 1188374 for CVE-2021-3648", url: "https://bugzilla.suse.com/1188374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-3648", }, { cve: "CVE-2021-3826", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3826", }, ], notes: [ { category: "general", text: "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3826", url: "https://www.suse.com/security/cve/CVE-2021-3826", }, { category: "external", summary: "SUSE Bug 1202969 for CVE-2021-3826", url: "https://bugzilla.suse.com/1202969", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-3826", }, { cve: "CVE-2021-45078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-45078", }, ], notes: [ { category: "general", text: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-45078", url: "https://www.suse.com/security/cve/CVE-2021-45078", }, { category: "external", summary: "SUSE Bug 1193929 for CVE-2021-45078", url: "https://bugzilla.suse.com/1193929", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46195", }, ], notes: [ { category: "general", text: "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46195", url: "https://www.suse.com/security/cve/CVE-2021-46195", }, { category: "external", summary: "SUSE Bug 1194783 for CVE-2021-46195", url: "https://bugzilla.suse.com/1194783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2021-46195", }, { cve: "CVE-2022-27943", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-27943", }, ], notes: [ { category: "general", text: "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-27943", url: "https://www.suse.com/security/cve/CVE-2022-27943", }, { category: "external", summary: "SUSE Bug 1197592 for CVE-2022-27943", url: "https://bugzilla.suse.com/1197592", }, { category: "external", summary: "SUSE Bug 1205481 for CVE-2022-27943", url: "https://bugzilla.suse.com/1205481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-27943", }, { cve: "CVE-2022-38126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-38126", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-38126", url: "https://www.suse.com/security/cve/CVE-2022-38126", }, { category: "external", summary: "SUSE Bug 1202966 for CVE-2022-38126", url: "https://bugzilla.suse.com/1202966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-38127", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-38127", url: "https://www.suse.com/security/cve/CVE-2022-38127", }, { category: "external", summary: "SUSE Bug 1202967 for CVE-2022-38127", url: "https://bugzilla.suse.com/1202967", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-38127", }, { cve: "CVE-2022-38533", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-38533", }, ], notes: [ { category: "general", text: "In GNU Binutils before 2.40, there is a heap-buffer-overflow in the error function bfd_getl32 when called from the strip_main function in strip-new via a crafted file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-38533", url: "https://www.suse.com/security/cve/CVE-2022-38533", }, { category: "external", summary: "SUSE Bug 1202816 for CVE-2022-38533", url: "https://bugzilla.suse.com/1202816", }, { category: "external", summary: "SUSE Bug 1206168 for CVE-2022-38533", url: "https://bugzilla.suse.com/1206168", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:binutils-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-devel-32bit-2.39-2.1.x86_64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.aarch64", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.ppc64le", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.s390x", "openSUSE Tumbleweed:binutils-gold-2.39-2.1.x86_64", "openSUSE Tumbleweed:gprofng-2.39-2.1.aarch64", "openSUSE Tumbleweed:gprofng-2.39-2.1.ppc64le", "openSUSE Tumbleweed:gprofng-2.39-2.1.s390x", "openSUSE Tumbleweed:gprofng-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf-nobfd0-2.39-2.1.x86_64", "openSUSE Tumbleweed:libctf0-2.39-2.1.aarch64", "openSUSE Tumbleweed:libctf0-2.39-2.1.ppc64le", "openSUSE Tumbleweed:libctf0-2.39-2.1.s390x", "openSUSE Tumbleweed:libctf0-2.39-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2022-38533", }, ], }
ghsa-wg2c-jc4j-gg9c
Vulnerability from github
Published
2021-12-16 00:00
Modified
2022-03-30 00:01
Severity ?
Details
stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.
{ affected: [], aliases: [ "CVE-2021-45078", ], database_specific: { cwe_ids: [ "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-12-15T20:15:00Z", severity: "CRITICAL", }, details: "stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.", id: "GHSA-wg2c-jc4j-gg9c", modified: "2022-03-30T00:01:59Z", published: "2021-12-16T00:00:30Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-45078", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202208-30", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20220107-0002", }, { type: "WEB", url: "https://sourceware.org/bugzilla/show_bug.cgi?id=28694", }, { type: "WEB", url: "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.