<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">SUSE-IU-2024:1257-1</DocumentTitle>
  <DocumentType>SUSE Image</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE Image SUSE-IU-2024:1257-1</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-03-19T08:53:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-09-13T01:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-09-13T01:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-publiccloud.pl</Engine>
      <Date>2021-02-18T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Image update for SUSE-IU-2024:1257-1 / google/sles-15-sp5-sapcal-v20240913-x86-64</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This image update for google/sles-15-sp5-sapcal-v20240913-x86-64 contains the following changes:
Package apache2 was updated:

- Apply fix for CVE-2024-39884, bsc#1227353.  Patch file added:
  * apache2-CVE-2024-39884.patch

- Apply fix for CVE-2024-38474, bsc#1227278.
  Patch file added:
  * apache2-CVE-2024-38474.patch
- Apply fix for CVE-2024-38473, bsc#1227276.
  Patch files added:
  * apache2-CVE-2024-38473-1.patch
  * apache2-CVE-2024-38473-2.patch
  * apache2-CVE-2024-38473-3.patch
  * apache2-CVE-2024-38473-4.patch

Package binutils was updated:

- Update to current 2.43.1 branch [PED-10474]:  * PR32109 - fuzzing problem
  * PR32083 - LTO vs overridden common symbols
  * PR32067 - crash with LTO-plugin and --oformat=binary
  * PR31956 - LTO vs wrapper symbols
  * riscv - add Zimop and Zcmop extensions
- Adjusted binutils-2.43-branch.diff.gz.

- Update to version 2.43:
  * new .base64 pseudo-op, allowing base64 encoded data as strings
  * Intel APX: add support for CFCMOV, CCMP, CTEST, zero-upper, NF
    (APX_F now fully supported)
  * x86 Intel syntax now warns about more mnemonic suffixes
  * macros and .irp/.irpc/.rept bodies can use \+ to get at number
    of times the macro/body was executed
  * aarch64: support 'armv9.5-a' for -march, add support for LUT
    and LUT2
  * s390: base register operand in D(X,B) and D(L,B) can now be
    omitted (ala 'D(X,)'); warn when register type doesn't match
    operand type (use option
    'warn-regtype-mismatch=[strict|relaxed|no]' to adjust)
  * riscv: support various extensions: Zacas, Zcmp, Zfbfmin,
    Zvfbfmin, Zvfbfwma, Smcsrind/Sscsrind, XCvMem, XCvBi, XCvElw,
    XSfCease, all at version 1.0;
    remove support for assembly of privileged spec 1.9.1 (linking
    support remains)
  * arm: remove support for some old co-processors: Maverick and FPA
  * mips: '--trap' now causes either trap or breakpoint instructions
    to be emitted as per current ISA, instead of always using trap
    insn and failing when current ISA was incompatible with that
  * LoongArch: accept .option pseudo-op for fine-grained control
    of assembly code options; add support for DT_RELR
  * readelf: now displays RELR relocations in full detail;
    add -j/--display-section to show just those section(s) content
    according to their type
  * objdump/readelf now dump also .eh_frame_hdr (when present) when
    dumping .eh_frame
  * gprofng: add event types for AMD Zen3/Zen4 and Intel Ice Lake
    processors; add minimal support for riscv
  * linker:
  - put .got and .got.plt into relro segment
  - add -z isa-level-report=[none|all|needed|used] to the x86 ELF
    linker to report needed and used x86-64 ISA levels
  - add --rosegment option which changes the -z separate-code
    option so that only one read-only segment is created (instead
    of two)
  - add --section-ordering-file &amp;lt;FILE&amp;gt; option to add extra
    mapping of input sections to output sections
  - add -plugin-save-temps to store plugin intermediate files
    permanently
- Removed binutils-2.42.tar.bz2, binutils-2.42-branch.diff.gz.
- Added binutils-2.43.tar.bz2, binutils-2.43-branch.diff.gz.
- Removed upstream patch riscv-no-relax.patch.
- Rebased ld-relro.diff and binutils-revert-rela.diff.

- binutils-pr22868.diff: Remove obsolete patch
- Undefine _FORTIFY_SOURCE when running checks

- Allow to disable profiling

- Use %patch -P N instead of deprecated %patchN.

- riscv-no-relax.patch: RISC-V: Don't generate branch/jump relocation if
  symbol is local when no-relax

- Add binutils-disable-code-arch-error.diff to demote an
  error about swapped .arch/.code directives to a warning.
  It happens in the wild.

- Update to version 2.42:
  * Add support for many aarch64 extensions: SVE2.1, SME2.1, B16B16,
  RASv2, LSE128, GCS, CHK, SPECRES2, LRCPC3, THE, ITE, D128, XS and
  flags to enable them: '+fcma', '+jscvt', '+frintts', '+flagm2',
  '+rcpc2' and '+wfxt'
  * Add experimantal support for GAS to synthesize call-frame-info for
  some hand-written asm (--scfi=experimental) on x86-64.
  * Add support for more x86-64 extensions: APX: 32 GPRs, NDD, PUSH2/POP2,
  PUSHP/POPP; USER_MSR, AVX10.1, PBNDKB, SM4, SM3, SHA512, AVX-VNNI-INT16.
  * Add support for more RISC-V extensions: T-Head v2.3.0, CORE-V v1.0,
  SiFive VCIX v1.0.
  * BPF assembler: ';' separates statements now, and does not introduce
  line comments anymore (use '#' or '//' for this).
  * x86-64 ld: Add '-z mark-plt/-z nomark-plt' to mark PLT entries with
  dynamic tags.
  * risc-v ld: Add '--[no-]check-uleb128'.
  * New linker script directive: REVERSE, to be combined with SORT_BY_NAME
  or SORT_BY_INIT_PRIORITY, reverses the generated order.
  * New linker options --warn-execstack-objects (warn only about execstack
  when input object files request it), and --error-execstack plus
  - -error-rxw-segments to convert the existing warnings into errors.
  * objdump: Add -Z/--decompress to be used with -s/--full-contents to
  decompress section contents before displaying.
  * readelf: Add --extra-sym-info to be used with --symbols (currently
  prints section name of references section index).
  * objcopy: Add --set-section-flags for x86_64 to include
  SHF_X86_64_LARGE.
  * s390 disassembly: add target-specific disasm option 'insndesc',
  as in &amp;quot;objdump -M insndesc&amp;quot; to display an instruction description
  as comment along with the disassembly.
- Add binutils-2.42-branch.diff.gz.
- Rebased s390-biarch.diff.
- Adjusted binutils-revert-hlasm-insns.diff,
  binutils-revert-plt32-in-branches.diff and binutils-revert-rela.diff
  for upstream changes.
- Removed binutils-2.41-branch.diff.gz, binutils-2.41.tar.bz2,
  binutils-2.41-branch.diff.gz.
- Removed binutils-use-less-memory.diff, binutils-old-makeinfo.diff
  and riscv-relro.patch (all upstreamed).
- Removed add-ulp-section.diff, we use a different mechanism
  for live patching since a long time.

- Add binutils-use-less-memory.diff to be a little nicer to 32bit
  userspace and huge links.  [bsc#1216908]

- riscv-relro.patch: RISC-V: Protect .got with relro

- Add libzstd-devel to Requires of binutils-devel. (bsc#1215341)

Package cloud-regionsrv-client was updated:

- Update to 10.3.4  + Modify the message when network access over a specific IP version does
    not work. This is an informational message and should not look like
    an error
  + Inform the user that LTSS registration takes a little longer
  + Add fix-for-sles12-no-trans_update.patch
    + SLE 12 family has no products with transactional-update we do not
    need to look for this condition
- From 10.3.3 (bsc#1229472)
  + Handle changes in process structure to properly identify the running
    zypper parent process and only check for 1 PID
- From 10.3.2
  + Remove rgnsrv-clnt-fix-docker-setup.patch included upstream
- From 10.3.1 (jsc#PCT-400)
  + Add support for LTSS registration
  + Add fix-for-sles12-disable-registry.patch
    ~ No container support in SLE 12

Package containerd was updated:

- Update to containerd v1.7.21. Upstream release notes:  &amp;lt;https://github.com/containerd/containerd/releases/tag/v1.7.21&amp;gt;
  Fixes CVE-2023-47108. bsc#1217070
  Fixes CVE-2023-45142. bsc#1228553
- Rebase patches:
  * 0001-BUILD-SLE12-revert-btrfs-depend-on-kernel-UAPI-inste.patch

Package cups was updated:

- cups-branch-2.2-commit-b643d6ba92f00752aa5e74ff86ad3974334914c1.diff  is https://github.com/OpenPrinting/cups/commit/b643d6ba92f00752aa5e74ff86ad3974334914c1
  which was added in CUPS 2.2.8 that
  fixed a parsing bug in cups_auth_find() in cups/auth.c
  which lead to cupsd failing to authenticate users
  when group membership is required by cupsd configuration
  like 'Require user @GROUP' which lead to CUPS related commands
  requesting password from group users even if it is not needed
  (bsc#1226227)
- In cups.changes replaced one place where UTF-8 characters
  were used in the entry dated &amp;quot;Sat Sep 30 08:52:42 UTC 2017&amp;quot;
  for what should be ' - ' by ASCII to avoid RPMLINT warning
  about 'non-break-space' which &amp;quot;can lead to obscure errors&amp;quot;.

Package curl was updated:

- Security fix: [bsc#1230093, CVE-2024-8096]  * curl: OCSP stapling bypass with GnuTLS
  * Add curl-CVE-2024-8096.patch

- Security fix: [bsc#1228535, CVE-2024-7264]
  * curl: ASN.1 date parser overread
  * Add curl-CVE-2024-7264.patch

Package deltarpm was updated:

- update to deltarpm-3.6.4  * support for threaded zstd
  * use a tmp file instead of memory to hold the incore data
    [bsc#1228948]
- dropped patches:
  * deltarpm-b7987f6aa4211df3df03dcfc55a00b2ce7472e0a.patch

- deltarpm-b7987f6aa4211df3df03dcfc55a00b2ce7472e0a.patch: fixed
  some C bugs ( incorrect sized memset() , memcpy instead of strcpy,
  unsigned int)

- update to deltarpm-3.6.3
  * support for threaded zstd compression

- Actually enable zstd compression

- update to deltarpm-3.6.2
  * support for zstd compression

Package dracut was updated:

- Update to version 055+suse.392.g7930ab23:  * feat(systemd*): include systemd config files from /usr/lib/systemd (bsc#1228398)
  * fix(convertfs): error in conditional expressions (bsc#1228847)

Package expat was updated:

- Security fix (bsc#1229932, CVE-2024-45492): detect integer  overflow in function nextScaffoldPart
  * Added expat-CVE-2024-45492.patch
- Security fix (bsc#1229931, CVE-2024-45491): detect integer
  overflow in dtdCopy
  * Added expat-CVE-2024-45491.patch
- Security fix (bsc#1229930, CVE-2024-45490): reject negative
  len for XML_ParseBuffer
  * Added expat-CVE-2024-45490.patch

Package glib2 was updated:

- Add glib2-gdbusmessage-cache-arg0.patch: cache the arg0 value in  a dbus message. Fixes a possible use after free (boo#1224044).

Package glibc was updated:

- s390x-wcsncmp.patch: s390x: Fix segfault in wcsncmp (bsc#1228043, BZ  [#31934])

Package java-1_8_0-ibm was updated:

- Update to Java 8.0 Service Refresh 8 Fix Pack 30:  * Oracle July 16 2024 CPU and IBM Security Update August 2024 [bsc#1228346]
    [bsc#1228052, CVE-2024-21147] [bsc#1228051, CVE-2024-21145]
    [bsc#1228048, CVE-2024-21140] [bsc#1228050, CVE-2024-21144]
    [bsc#1228047, CVE-2024-21138] [bsc#1228046, CVE-2024-21131]
    [bsc#1229224, CVE-2024-27267]
  * IJ51325 Class Libraries: Enabling -xshareclasses may trigger
    noclassdeffounderrors in certain circumstances
  * IJ51873 Class Libraries: Fix security vulnerability CVE-2024-21144
  * IJ51871 Class Libraries: Fix security vulnerability CVE-2024-21145
  * IJ51918 Java Virtual Machine: Fix security vulnerability CVE-2024-21131
  * IX90197 ORB: Fix security vulnerability CVE-2024-27267
  * IJ51699 Security: Update gskit crypto for c level to 8.9.6.x for
    non-FIPS and 8.8.1.0 for FIPS 140-3
  * IJ51305 Security: Get keys operation failing for keys with ed25519
    and ed448 from a pkcs12 keystore
  * IJ51819 Security: ibmjceplus, ibmjceplusfips providers' rsa signature
    verification, does not verify signatures when algorithmidentifier's optional
  * IJ51611 Security: ibmjce provider throws an unrecoverablekeyexception
    when null is specified as the key protection password for a private key.
  * IJ50946 Security: ibmpkcs11impl crypto provider can silently fail to
    initialize if it encounters a config file error.
  * IJ51203 Security: jdk-88171279 : support x25519 and x448 keyexchange in tls
  * IJ51681 Security: Keytool generate key pair operation failing for keys
    with ed25519 or ed448
  * IJ51612 Security: Missing support of tlsv1 with
    com.ibm.jsse2.overridedefaultprotocol=tlsv1
  * IJ51443 Security: Nullpointerexception is thrown when fips is enabled
    and com.ibm.jsse2.overridedefaultprotocol is set
  * IJ51335 Security: Pksscertfactory.newsscert() api generate error when
    a certificate is created having subjectalternativenames starts with asterisk
  * IJ51469 Security: Refresh the xmldsigri provider implementation to
    incorporate 3 oracle work items

- Update to Java 8.0 Service Refresh 8 Fix Pack 26:
  * IJ51405 Service, Build, Packaging and Deliver: Java RPM will
    not verify upon install with FIPS enabled
  * IJ50877 JIT Compiler: Incorrect argument passed to a jni method
  * IJ50878 JIT Compiler: SEGV in array copy for stringbuffer or
    stringbuilder on power or aarch64

Package mozilla-nss was updated:

- Updated nss-fips-approved-crypto-non-ec.patch to enforce  approved curves with the CKK_EC_MONTGOMERY key type (bsc#1224113).

Package libpcap was updated:

- Security fix: [bsc#1230034, CVE-2024-8006]  * libpcap: NULL pointer derefence in pcap_findalldevs_ex()
  * Add libpcap-CVE-2024-8006.patch

- Security fix: [bsc#1230020, CVE-2023-7256]
  * libpcap: double free via addrinfo in sock_initaddress()
  * Add libpcap-CVE-2023-7256.patch

Package libsolv was updated:

- removed dependency on external find program in the repo2solv tool- bindings: fix return value of repodata.add_solv()
- new SOLVER_FLAG_FOCUS_NEW flag
- bump version to 0.7.30

Package systemd was updated:

- Import commit a57a6d239c5d6b91fb3dcd269705e60804a03ae1  cd0c9ac4f4 unit: drop ProtectClock=yes from systemd-udevd.service (bsc#1226414)
  e1eaa86a49 udev: do not set ID_PATH and by-path symlink for nvmf disks
  a85d211874 man: Document ranges for distributions config files and local config files

- Don't mention any rpm macros inside comments, even if escaped (bsc#1228091)
  Otherwise pesign-obs-integration ends up re-packaging systemd with all macros
  inside comments unescaped leading to unpredictable behavior. Now why rpm
  expands rpm macros inside comments is the question...

- Update 1011-sysv-generator-add-back-support-for-SysV-scripts-for.patch
  Really skip redundant dependencies specified the LSB description that
  references the file name of the service itself for early boot scripts (noticed
  in bsc#1221479).

Package tiff was updated:

- security update:  * CVE-2024-7006 [bsc#1228924]
    Fix pointer deref in tif_dirinfo.c
    + tiff-CVE-2024-7006.patch

Package libzypp was updated:

- Make sure not to statically linked installed tools (bsc#1228787)- version 17.35.8 (35)

- MediaPluginType must be resolved to a valid MediaHandler
  (bsc#1228208)
- version 17.35.7 (35)

- Export CredentialManager for legacy YAST versions (bsc#1228420)
- version 17.35.6 (35)

- Export asSolvable for YAST (bsc#1228420)
- Fix 4 typos in zypp.conf.
- version 17.35.5 (35)

- Fix typo in the geoip update pipeline (bsc#1228206)
- Export RepoVariablesStringReplacer for yast2 (bsc#1228138)
- version 17.35.4 (35)

- Translation: updated .pot file.
- Conflict with python zypp-plugin &amp;lt; 0.6.4 (bsc#1227793)
  Older zypp-plugins reject stomp headers including a '-'. Like the
  'content-length' header we may send.
- Fix int overflow in Provider (fixes #559)
  This patch fixes an issue in safe_strtonum which caused
  timestamps to overflow in the Provider message parser.
- Fix error reporting on repoindex.xml parse error (bsc#1227625)
- version 17.35.3 (35)

- Keep UrlResolverPlugin API public (fixes #560)
- Blacklist /snap executables for 'zypper ps' (bsc#1226014)
- Fix handling of buddies when applying locks (bsc#1225267)
  Buddy pairs (like -release package and product) internally share
  the same status object. When applying locks from query results
  the locked bit must be set if either item is locked.
- version 17.35.2 (35)

- Install zypp/APIConfig.h legacy include (fixes #557)
- version 17.35.1 (35)

- Update soname due to RepoManager refactoring and cleanup.
- version 17.35.0 (35)

- Workaround broken libsolv-tools-base requirements (fixes
  openSUSE/zypper#551)
- Strip ssl_clientkey from repo urls (bsc#1226030)
- Remove protobuf build dependency.
- Lazily attach medium during refresh workflows (bsc#1223094)
- Refactor RepoManager and add Service workflows.
- version 17.34.2 (34)

Package python3-setuptools was updated:

- Add patch CVE-2024-6345-code-execution-via-download-funcs.patch:  * Sanitize any VCS URL we download. (CVE-2024-6345, bsc#1228105)

Package regionServiceClientConfigGCE was updated:

- Version 4.2.0 (jsc#PCT-361)  + Add IPv6 certs to supprt access of the update infrastructure via
    IPv6 on GCE instances.

- Update to version 4.1.0 (bsc#1217538)
  + Replace 162.222.182.90 and 35.187.193.56 (length 4096):
    rgnsrv-gce-asia-northeast1 -&amp;gt; 162.222.182.90 expires in 9 years
    rgnsrv-gce-us-central1 -&amp;gt; 35.187.193.56 expires in 10 years

Package runc was updated:

[ This was only ever released for SLES and Leap. ]- Update to runc v1.1.14. Upstream changelog is available from
  &amp;lt;https://github.com/opencontainers/runc/releases/tag/v1.1.14&amp;gt;.
  Includes the patch for CVE-2024-45310. bsc#1230092
- Rebase patches:
  * 0001-bsc1221050-libct-seccomp-patchbpf-rm-duplicated-code.patch
  * 0002-bsc1221050-seccomp-patchbpf-rename-nativeArch-linuxA.patch
  * 0003-bsc1221050-seccomp-patchbpf-always-include-native-ar.patch
  * 0004-bsc1214960-nsenter-cloned_binary-remove-bindfd-logic.patch

Package 000release-packages:sle-module-basesystem-release was updated:

Package 000release-packages:sle-module-containers-release was updated:

Package 000release-packages:sle-module-desktop-applications-release was updated:

Package 000release-packages:sle-module-development-tools-release was updated:

Package 000release-packages:sle-module-public-cloud-release was updated:

Package 000release-packages:sle-module-python3-release was updated:

Package 000release-packages:sle-module-server-applications-release was updated:

Package 000release-packages:sle-module-web-scripting-release was updated:

Package supportutils was updated:

- Changes to version 3.2.8  + Avoid getting duplicate kernel verifications in boot.text (pr#190)
  + lvm: suppress file descriptor leak warnings from lvm commands (pr#191)
  + docker_info: Add timestamps to container logs (pr#196)
  + Key value pairs and container log timestamps (bsc#1222021 PED-8211, pr#198)
  + Update supportconfig get pam.d sorted (pr#199)
  + yast_files: Exclude .zcat (pr#201)
  + Sanitize grub bootloader (bsc#1227127, pr#203)
  + Sanitize regcodes (pr#204)
  + Improve product detection (pr#205)
  + Add read_values for s390x (bsc#1228265, pr#206)
  + hardware_info: Remove old alsa ver check (pr#209)
  + drbd_info: Fix incorrect escape of quotes (pr#210)

Package suse-build-key was updated:

- extended 2048 bit SUSE SLE 12, 15 GA-SP5 key until 2028. (bsc#1229339)  - gpg-pubkey-39db7c82-5f68629b.asc
  + gpg-pubkey-39db7c82-66c5d91a.asc

Package unzip was updated:

- Use %patch -P N instead of deprecated %patchN.
- Build unzip-rcc using multibuild and update unzip-rcc.spec file

Package xen was updated:

- Update to Xen 4.17.5 security bug fix release (bsc#1027519)  xen-4.17.5-testing-src.tar.bz2
  * No upstream changelog found in sources or webpage
- bsc#1228574 - VUL-0: CVE-2024-31145: xen: error handling in x86
  IOMMU identity mapping (XSA-460)
- bsc#1228575 - VUL-0: CVE-2024-31146: xen: PCI device pass-through
  with shared resources (XSA-461)
- Dropped patches contained in new tarball
  6617d62c-x86-hvm-Misra-Rule-19-1-regression.patch
  6627a4ee-vRTC-UIP-set-for-longer-than-expected.patch
  6627a5fc-x86-MTRR-inverted-WC-check.patch
  662a6a4c-x86-spec-reporting-of-BHB-clearing.patch
  662a6a8d-x86-spec-adjust-logic-to-elide-LFENCE.patch
  663090fd-x86-gen-cpuid-syntax.patch
  663a383c-libxs-open-xenbus-fds-as-O_CLOEXEC.patch
  663a4f3e-x86-cpu-policy-migration-IceLake-to-CascadeLake.patch
  663d05b5-x86-ucode-distinguish-up-to-date.patch
  663eaa27-libxl-XenStore-error-handling-in-device-creation.patch
  66450626-sched-set-all-sched_resource-data-inside-locked.patch
  66450627-x86-respect-mapcache_domain_init-failing.patch
  6646031f-x86-ucode-further-identify-already-up-to-date.patch
  6666ba52-x86-irq-remove-offline-CPUs-from-old-CPU-mask-when.patch
  666994ab-x86-SMP-no-shorthand-IPI-in-hotplug.patch
  666994f0-x86-IRQ-limit-interrupt-movement-in-fixup_irqs.patch
  666b07ee-x86-EPT-special-page-in-epte_get_entry_emt.patch
  666b0819-x86-EPT-avoid-marking-np-ents-for-reconfig.patch
  666b085a-x86-EPT-drop-questionable-mfn_valid-from-.patch
  667187cc-x86-Intel-unlock-CPUID-earlier.patch
  66718849-x86-IRQ-old_cpu_mask-in-fixup_irqs.patch
  6671885e-x86-IRQ-handle-moving-in-_assign_irq_vector.patch
  6672c846-x86-xstate-initialisation-of-XSS-cache.patch
  6672c847-x86-CPUID-XSAVE-dynamic-leaves.patch
  6673ffdc-x86-IRQ-forward-pending-to-new-dest-in-fixup_irqs.patch
  xsa458.patch

Package yast2-installation was updated:

- Don't block in AutoYaST upgrade (bsc#1181625)- 4.5.20

Package zypper was updated:

- Show rpm install size before installing (bsc#1224771)  If filesystem snapshots are taken before the installation (e.g.
  by snapper) no disk space is freed by removing old packages. In
  this case the install size of all packages is a hint how much
  additional disk space is needed by the new packages static
  content.
- version 1.14.76

- Fix readline setup to handle Ctrl-C and Ctrl-D corrrectly
  (bsc#1227205)
- version 1.14.75

- Let_readline_abort_on_Ctrl-C (bsc#1226493)
- packages: add '--system' to show @System packages (bsc#222971)
- version 1.14.74

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://publiccloudimagechangeinfo.suse.com/google/sles-15-sp5-sapcal-v20240913-x86-64/</URL>
      <Description>Public Cloud Image Info</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <Branch Type="Product Name" Name="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
        <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.51-150400.6.34.1">
      <FullProductName ProductID="apache2-2.4.51-150400.6.34.1">apache2-2.4.51-150400.6.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.51-150400.6.34.1">
      <FullProductName ProductID="apache2-prefork-2.4.51-150400.6.34.1">apache2-prefork-2.4.51-150400.6.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.51-150400.6.34.1">
      <FullProductName ProductID="apache2-utils-2.4.51-150400.6.34.1">apache2-utils-2.4.51-150400.6.34.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="binutils-2.43-150100.7.49.1">
      <FullProductName ProductID="binutils-2.43-150100.7.49.1">binutils-2.43-150100.7.49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloud-regionsrv-client-10.3.4-150300.13.9.1">
      <FullProductName ProductID="cloud-regionsrv-client-10.3.4-150300.13.9.1">cloud-regionsrv-client-10.3.4-150300.13.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1">
      <FullProductName ProductID="cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1">cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="containerd-1.7.21-150000.117.1">
      <FullProductName ProductID="containerd-1.7.21-150000.117.1">containerd-1.7.21-150000.117.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cups-config-2.2.7-150000.3.65.1">
      <FullProductName ProductID="cups-config-2.2.7-150000.3.65.1">cups-config-2.2.7-150000.3.65.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="curl-8.0.1-150400.5.50.1">
      <FullProductName ProductID="curl-8.0.1-150400.5.50.1">curl-8.0.1-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="deltarpm-3.6.4-150000.5.3.2">
      <FullProductName ProductID="deltarpm-3.6.4-150000.5.3.2">deltarpm-3.6.4-150000.5.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="docker-25.0.6_ce-150000.207.1">
      <FullProductName ProductID="docker-25.0.6_ce-150000.207.1">docker-25.0.6_ce-150000.207.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="dracut-055+suse.392.g7930ab23-150500.3.24.2">
      <FullProductName ProductID="dracut-055+suse.392.g7930ab23-150500.3.24.2">dracut-055+suse.392.g7930ab23-150500.3.24.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="expat-2.4.4-150400.3.22.1">
      <FullProductName ProductID="expat-2.4.4-150400.3.22.1">expat-2.4.4-150400.3.22.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-devel-2.70.5-150400.3.14.1">
      <FullProductName ProductID="glib2-devel-2.70.5-150400.3.14.1">glib2-devel-2.70.5-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glib2-tools-2.70.5-150400.3.14.1">
      <FullProductName ProductID="glib2-tools-2.70.5-150400.3.14.1">glib2-tools-2.70.5-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-2.31-150300.86.3">
      <FullProductName ProductID="glibc-2.31-150300.86.3">glibc-2.31-150300.86.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-32bit-2.31-150300.86.3">
      <FullProductName ProductID="glibc-32bit-2.31-150300.86.3">glibc-32bit-2.31-150300.86.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-devel-2.31-150300.86.3">
      <FullProductName ProductID="glibc-devel-2.31-150300.86.3">glibc-devel-2.31-150300.86.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-i18ndata-2.31-150300.86.3">
      <FullProductName ProductID="glibc-i18ndata-2.31-150300.86.3">glibc-i18ndata-2.31-150300.86.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-2.31-150300.86.3">
      <FullProductName ProductID="glibc-locale-2.31-150300.86.3">glibc-locale-2.31-150300.86.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glibc-locale-base-2.31-150300.86.3">
      <FullProductName ProductID="glibc-locale-base-2.31-150300.86.3">glibc-locale-base-2.31-150300.86.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1">
      <FullProductName ProductID="java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1">java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1">
      <FullProductName ProductID="java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1">java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1">
      <FullProductName ProductID="java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1">java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libctf-nobfd0-2.43-150100.7.49.1">
      <FullProductName ProductID="libctf-nobfd0-2.43-150100.7.49.1">libctf-nobfd0-2.43-150100.7.49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libctf0-2.43-150100.7.49.1">
      <FullProductName ProductID="libctf0-2.43-150100.7.49.1">libctf0-2.43-150100.7.49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcups2-2.2.7-150000.3.65.1">
      <FullProductName ProductID="libcups2-2.2.7-150000.3.65.1">libcups2-2.2.7-150000.3.65.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl-devel-8.0.1-150400.5.50.1">
      <FullProductName ProductID="libcurl-devel-8.0.1-150400.5.50.1">libcurl-devel-8.0.1-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-8.0.1-150400.5.50.1">
      <FullProductName ProductID="libcurl4-8.0.1-150400.5.50.1">libcurl4-8.0.1-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libcurl4-32bit-8.0.1-150400.5.50.1">
      <FullProductName ProductID="libcurl4-32bit-8.0.1-150400.5.50.1">libcurl4-32bit-8.0.1-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexpat-devel-2.4.4-150400.3.22.1">
      <FullProductName ProductID="libexpat-devel-2.4.4-150400.3.22.1">libexpat-devel-2.4.4-150400.3.22.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libexpat1-2.4.4-150400.3.22.1">
      <FullProductName ProductID="libexpat1-2.4.4-150400.3.22.1">libexpat1-2.4.4-150400.3.22.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.101.2-150400.3.51.1">
      <FullProductName ProductID="libfreebl3-3.101.2-150400.3.51.1">libfreebl3-3.101.2-150400.3.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgio-2_0-0-2.70.5-150400.3.14.1">
      <FullProductName ProductID="libgio-2_0-0-2.70.5-150400.3.14.1">libgio-2_0-0-2.70.5-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libglib-2_0-0-2.70.5-150400.3.14.1">
      <FullProductName ProductID="libglib-2_0-0-2.70.5-150400.3.14.1">libglib-2_0-0-2.70.5-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgmodule-2_0-0-2.70.5-150400.3.14.1">
      <FullProductName ProductID="libgmodule-2_0-0-2.70.5-150400.3.14.1">libgmodule-2_0-0-2.70.5-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgobject-2_0-0-2.70.5-150400.3.14.1">
      <FullProductName ProductID="libgobject-2_0-0-2.70.5-150400.3.14.1">libgobject-2_0-0-2.70.5-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgthread-2_0-0-2.70.5-150400.3.14.1">
      <FullProductName ProductID="libgthread-2_0-0-2.70.5-150400.3.14.1">libgthread-2_0-0-2.70.5-150400.3.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpcap1-1.10.1-150400.3.3.2">
      <FullProductName ProductID="libpcap1-1.10.1-150400.3.3.2">libpcap1-1.10.1-150400.3.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.101.2-150400.3.51.1">
      <FullProductName ProductID="libsoftokn3-3.101.2-150400.3.51.1">libsoftokn3-3.101.2-150400.3.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsolv-tools-0.7.30-150400.3.27.2">
      <FullProductName ProductID="libsolv-tools-0.7.30-150400.3.27.2">libsolv-tools-0.7.30-150400.3.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsolv-tools-base-0.7.30-150400.3.27.2">
      <FullProductName ProductID="libsolv-tools-base-0.7.30-150400.3.27.2">libsolv-tools-base-0.7.30-150400.3.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsystemd0-249.17-150400.8.43.1">
      <FullProductName ProductID="libsystemd0-249.17-150400.8.43.1">libsystemd0-249.17-150400.8.43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libtiff5-4.0.9-150000.45.47.1">
      <FullProductName ProductID="libtiff5-4.0.9-150000.45.47.1">libtiff5-4.0.9-150000.45.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libudev1-249.17-150400.8.43.1">
      <FullProductName ProductID="libudev1-249.17-150400.8.43.1">libudev1-249.17-150400.8.43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libyui-ncurses-pkg16-4.5.3-150500.3.10.1">
      <FullProductName ProductID="libyui-ncurses-pkg16-4.5.3-150500.3.10.1">libyui-ncurses-pkg16-4.5.3-150500.3.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libyui-ncurses16-4.5.3-150500.3.10.1">
      <FullProductName ProductID="libyui-ncurses16-4.5.3-150500.3.10.1">libyui-ncurses16-4.5.3-150500.3.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libyui16-4.5.3-150500.3.10.1">
      <FullProductName ProductID="libyui16-4.5.3-150500.3.10.1">libyui16-4.5.3-150500.3.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libzypp-17.35.8-150500.6.13.1">
      <FullProductName ProductID="libzypp-17.35.8-150500.6.13.1">libzypp-17.35.8-150500.6.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.101.2-150400.3.51.1">
      <FullProductName ProductID="mozilla-nss-3.101.2-150400.3.51.1">mozilla-nss-3.101.2-150400.3.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.101.2-150400.3.51.1">
      <FullProductName ProductID="mozilla-nss-certs-3.101.2-150400.3.51.1">mozilla-nss-certs-3.101.2-150400.3.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nscd-2.31-150300.86.3">
      <FullProductName ProductID="nscd-2.31-150300.86.3">nscd-2.31-150300.86.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-setuptools-44.1.1-150400.9.9.1">
      <FullProductName ProductID="python3-setuptools-44.1.1-150400.9.9.1">python3-setuptools-44.1.1-150400.9.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-solv-0.7.30-150400.3.27.2">
      <FullProductName ProductID="python3-solv-0.7.30-150400.3.27.2">python3-solv-0.7.30-150400.3.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-zypp-plugin-0.6.4-150400.13.4.1">
      <FullProductName ProductID="python3-zypp-plugin-0.6.4-150400.13.4.1">python3-zypp-plugin-0.6.4-150400.13.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="regionServiceClientConfigGCE-4.2.0-150000.4.15.1">
      <FullProductName ProductID="regionServiceClientConfigGCE-4.2.0-150000.4.15.1">regionServiceClientConfigGCE-4.2.0-150000.4.15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby-solv-0.7.30-150400.3.27.2">
      <FullProductName ProductID="ruby-solv-0.7.30-150400.3.27.2">ruby-solv-0.7.30-150400.3.27.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="runc-1.1.14-150000.70.1">
      <FullProductName ProductID="runc-1.1.14-150000.70.1">runc-1.1.14-150000.70.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="sles-release-15.5-150500.61.4.1">
      <FullProductName ProductID="sles-release-15.5-150500.61.4.1">sles-release-15.5-150500.61.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="supportutils-3.2.8-150300.7.35.33.1">
      <FullProductName ProductID="supportutils-3.2.8-150300.7.35.33.1">supportutils-3.2.8-150300.7.35.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="suse-build-key-12.0-150000.8.52.3">
      <FullProductName ProductID="suse-build-key-12.0-150000.8.52.3">suse-build-key-12.0-150000.8.52.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-249.17-150400.8.43.1">
      <FullProductName ProductID="systemd-249.17-150400.8.43.1">systemd-249.17-150400.8.43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="systemd-sysvinit-249.17-150400.8.43.1">
      <FullProductName ProductID="systemd-sysvinit-249.17-150400.8.43.1">systemd-sysvinit-249.17-150400.8.43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="udev-249.17-150400.8.43.1">
      <FullProductName ProductID="udev-249.17-150400.8.43.1">udev-249.17-150400.8.43.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="unzip-6.00-150000.4.14.1">
      <FullProductName ProductID="unzip-6.00-150000.4.14.1">unzip-6.00-150000.4.14.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.17.5_02-150500.3.36.1">
      <FullProductName ProductID="xen-libs-4.17.5_02-150500.3.36.1">xen-libs-4.17.5_02-150500.3.36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="yast2-installation-4.5.20-150500.3.12.3">
      <FullProductName ProductID="yast2-installation-4.5.20-150500.3.12.3">yast2-installation-4.5.20-150500.3.12.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="yast2-pkg-bindings-4.5.3-150500.3.10.1">
      <FullProductName ProductID="yast2-pkg-bindings-4.5.3-150500.3.10.1">yast2-pkg-bindings-4.5.3-150500.3.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zypper-1.14.76-150500.6.6.15">
      <FullProductName ProductID="zypper-1.14.76-150500.6.6.15">zypper-1.14.76-150500.6.6.15</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.51-150400.6.34.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-2.4.51-150400.6.34.1">apache2-2.4.51-150400.6.34.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.51-150400.6.34.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-prefork-2.4.51-150400.6.34.1">apache2-prefork-2.4.51-150400.6.34.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.51-150400.6.34.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-utils-2.4.51-150400.6.34.1">apache2-utils-2.4.51-150400.6.34.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="binutils-2.43-150100.7.49.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:binutils-2.43-150100.7.49.1">binutils-2.43-150100.7.49.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-regionsrv-client-10.3.4-150300.13.9.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:cloud-regionsrv-client-10.3.4-150300.13.9.1">cloud-regionsrv-client-10.3.4-150300.13.9.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1">cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="containerd-1.7.21-150000.117.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:containerd-1.7.21-150000.117.1">containerd-1.7.21-150000.117.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="cups-config-2.2.7-150000.3.65.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:cups-config-2.2.7-150000.3.65.1">cups-config-2.2.7-150000.3.65.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="curl-8.0.1-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:curl-8.0.1-150400.5.50.1">curl-8.0.1-150400.5.50.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="deltarpm-3.6.4-150000.5.3.2" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:deltarpm-3.6.4-150000.5.3.2">deltarpm-3.6.4-150000.5.3.2 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="docker-25.0.6_ce-150000.207.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:docker-25.0.6_ce-150000.207.1">docker-25.0.6_ce-150000.207.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="dracut-055+suse.392.g7930ab23-150500.3.24.2" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:dracut-055+suse.392.g7930ab23-150500.3.24.2">dracut-055+suse.392.g7930ab23-150500.3.24.2 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="expat-2.4.4-150400.3.22.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:expat-2.4.4-150400.3.22.1">expat-2.4.4-150400.3.22.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="glib2-devel-2.70.5-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:glib2-devel-2.70.5-150400.3.14.1">glib2-devel-2.70.5-150400.3.14.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="glib2-tools-2.70.5-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:glib2-tools-2.70.5-150400.3.14.1">glib2-tools-2.70.5-150400.3.14.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-2.31-150300.86.3" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:glibc-2.31-150300.86.3">glibc-2.31-150300.86.3 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-32bit-2.31-150300.86.3" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:glibc-32bit-2.31-150300.86.3">glibc-32bit-2.31-150300.86.3 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-devel-2.31-150300.86.3" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:glibc-devel-2.31-150300.86.3">glibc-devel-2.31-150300.86.3 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-i18ndata-2.31-150300.86.3" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:glibc-i18ndata-2.31-150300.86.3">glibc-i18ndata-2.31-150300.86.3 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-2.31-150300.86.3" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:glibc-locale-2.31-150300.86.3">glibc-locale-2.31-150300.86.3 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="glibc-locale-base-2.31-150300.86.3" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:glibc-locale-base-2.31-150300.86.3">glibc-locale-base-2.31-150300.86.3 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1">java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1">java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1">java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf-nobfd0-2.43-150100.7.49.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libctf-nobfd0-2.43-150100.7.49.1">libctf-nobfd0-2.43-150100.7.49.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libctf0-2.43-150100.7.49.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libctf0-2.43-150100.7.49.1">libctf0-2.43-150100.7.49.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcups2-2.2.7-150000.3.65.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcups2-2.2.7-150000.3.65.1">libcups2-2.2.7-150000.3.65.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl-devel-8.0.1-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcurl-devel-8.0.1-150400.5.50.1">libcurl-devel-8.0.1-150400.5.50.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-8.0.1-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcurl4-8.0.1-150400.5.50.1">libcurl4-8.0.1-150400.5.50.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libcurl4-32bit-8.0.1-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcurl4-32bit-8.0.1-150400.5.50.1">libcurl4-32bit-8.0.1-150400.5.50.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexpat-devel-2.4.4-150400.3.22.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libexpat-devel-2.4.4-150400.3.22.1">libexpat-devel-2.4.4-150400.3.22.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libexpat1-2.4.4-150400.3.22.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libexpat1-2.4.4-150400.3.22.1">libexpat1-2.4.4-150400.3.22.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-3.101.2-150400.3.51.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libfreebl3-3.101.2-150400.3.51.1">libfreebl3-3.101.2-150400.3.51.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgio-2_0-0-2.70.5-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libgio-2_0-0-2.70.5-150400.3.14.1">libgio-2_0-0-2.70.5-150400.3.14.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libglib-2_0-0-2.70.5-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libglib-2_0-0-2.70.5-150400.3.14.1">libglib-2_0-0-2.70.5-150400.3.14.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgmodule-2_0-0-2.70.5-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libgmodule-2_0-0-2.70.5-150400.3.14.1">libgmodule-2_0-0-2.70.5-150400.3.14.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgobject-2_0-0-2.70.5-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libgobject-2_0-0-2.70.5-150400.3.14.1">libgobject-2_0-0-2.70.5-150400.3.14.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgthread-2_0-0-2.70.5-150400.3.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libgthread-2_0-0-2.70.5-150400.3.14.1">libgthread-2_0-0-2.70.5-150400.3.14.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpcap1-1.10.1-150400.3.3.2" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libpcap1-1.10.1-150400.3.3.2">libpcap1-1.10.1-150400.3.3.2 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-3.101.2-150400.3.51.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libsoftokn3-3.101.2-150400.3.51.1">libsoftokn3-3.101.2-150400.3.51.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsolv-tools-0.7.30-150400.3.27.2" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libsolv-tools-0.7.30-150400.3.27.2">libsolv-tools-0.7.30-150400.3.27.2 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsolv-tools-base-0.7.30-150400.3.27.2" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libsolv-tools-base-0.7.30-150400.3.27.2">libsolv-tools-base-0.7.30-150400.3.27.2 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsystemd0-249.17-150400.8.43.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libsystemd0-249.17-150400.8.43.1">libsystemd0-249.17-150400.8.43.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libtiff5-4.0.9-150000.45.47.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libtiff5-4.0.9-150000.45.47.1">libtiff5-4.0.9-150000.45.47.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libudev1-249.17-150400.8.43.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libudev1-249.17-150400.8.43.1">libudev1-249.17-150400.8.43.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libyui-ncurses-pkg16-4.5.3-150500.3.10.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libyui-ncurses-pkg16-4.5.3-150500.3.10.1">libyui-ncurses-pkg16-4.5.3-150500.3.10.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libyui-ncurses16-4.5.3-150500.3.10.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libyui-ncurses16-4.5.3-150500.3.10.1">libyui-ncurses16-4.5.3-150500.3.10.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libyui16-4.5.3-150500.3.10.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libyui16-4.5.3-150500.3.10.1">libyui16-4.5.3-150500.3.10.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="libzypp-17.35.8-150500.6.13.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libzypp-17.35.8-150500.6.13.1">libzypp-17.35.8-150500.6.13.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-3.101.2-150400.3.51.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:mozilla-nss-3.101.2-150400.3.51.1">mozilla-nss-3.101.2-150400.3.51.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-3.101.2-150400.3.51.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:mozilla-nss-certs-3.101.2-150400.3.51.1">mozilla-nss-certs-3.101.2-150400.3.51.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="nscd-2.31-150300.86.3" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:nscd-2.31-150300.86.3">nscd-2.31-150300.86.3 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-setuptools-44.1.1-150400.9.9.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:python3-setuptools-44.1.1-150400.9.9.1">python3-setuptools-44.1.1-150400.9.9.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-solv-0.7.30-150400.3.27.2" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:python3-solv-0.7.30-150400.3.27.2">python3-solv-0.7.30-150400.3.27.2 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-zypp-plugin-0.6.4-150400.13.4.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:python3-zypp-plugin-0.6.4-150400.13.4.1">python3-zypp-plugin-0.6.4-150400.13.4.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="regionServiceClientConfigGCE-4.2.0-150000.4.15.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:regionServiceClientConfigGCE-4.2.0-150000.4.15.1">regionServiceClientConfigGCE-4.2.0-150000.4.15.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby-solv-0.7.30-150400.3.27.2" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:ruby-solv-0.7.30-150400.3.27.2">ruby-solv-0.7.30-150400.3.27.2 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="runc-1.1.14-150000.70.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:runc-1.1.14-150000.70.1">runc-1.1.14-150000.70.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="sles-release-15.5-150500.61.4.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:sles-release-15.5-150500.61.4.1">sles-release-15.5-150500.61.4.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="supportutils-3.2.8-150300.7.35.33.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:supportutils-3.2.8-150300.7.35.33.1">supportutils-3.2.8-150300.7.35.33.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="suse-build-key-12.0-150000.8.52.3" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:suse-build-key-12.0-150000.8.52.3">suse-build-key-12.0-150000.8.52.3 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-249.17-150400.8.43.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:systemd-249.17-150400.8.43.1">systemd-249.17-150400.8.43.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="systemd-sysvinit-249.17-150400.8.43.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:systemd-sysvinit-249.17-150400.8.43.1">systemd-sysvinit-249.17-150400.8.43.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="udev-249.17-150400.8.43.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:udev-249.17-150400.8.43.1">udev-249.17-150400.8.43.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="unzip-6.00-150000.4.14.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:unzip-6.00-150000.4.14.1">unzip-6.00-150000.4.14.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.17.5_02-150500.3.36.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:xen-libs-4.17.5_02-150500.3.36.1">xen-libs-4.17.5_02-150500.3.36.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="yast2-installation-4.5.20-150500.3.12.3" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:yast2-installation-4.5.20-150500.3.12.3">yast2-installation-4.5.20-150500.3.12.3 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="yast2-pkg-bindings-4.5.3-150500.3.10.1" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:yast2-pkg-bindings-4.5.3-150500.3.10.1">yast2-pkg-bindings-4.5.3-150500.3.10.1 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
    <Relationship ProductReference="zypper-1.14.76-150500.6.6.15" RelationType="Default Component Of" RelatesToProductReference="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64">
      <FullProductName ProductID="Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:zypper-1.14.76-150500.6.6.15">zypper-1.14.76-150500.6.6.15 as a component of Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.</Note>
    </Notes>
    <CVE>CVE-2023-45142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:containerd-1.7.21-150000.117.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Starting in version 0.37.0 and prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.</Note>
    </Notes>
    <CVE>CVE-2023-47108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:containerd-1.7.21-150000.117.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns.  This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block.  A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.</Note>
    </Notes>
    <CVE>CVE-2023-7256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libpcap1-1.10.1-150400.3.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2024-21131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2024-21138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2024-21140</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2024-21144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2024-21145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2024-21147</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads.</Note>
    </Notes>
    <CVE>CVE-2024-27267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Certain PCI devices in a system might be assigned Reserved Memory
Regions (specified via Reserved Memory Region Reporting, "RMRR") for
Intel VT-d or Unity Mapping ranges for AMD-Vi.  These are typically used
for platform tasks such as legacy USB emulation.

Since the precise purpose of these regions is unknown, once a device
associated with such a region is active, the mappings of these regions
need to remain continuouly accessible by the device.  In the logic
establishing these mappings, error handling was flawed, resulting in
such mappings to potentially remain in place when they should have been
removed again.  Respective guests would then gain access to memory
regions which they aren't supposed to have access to.</Note>
    </Notes>
    <CVE>CVE-2024-31145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:xen-libs-4.17.5_02-150500.3.36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When multiple devices share resources and one of them is to be passed
through to a guest, security of the entire system and of respective
guests individually cannot really be guaranteed without knowing
internals of any of the involved guests.  Therefore such a configuration
cannot really be security-supported, yet making that explicit was so far
missing.

Resources the sharing of which is known to be problematic include, but
are not limited to
- - PCI Base Address Registers (BARs) of multiple devices mapping to the
  same page (4k on x86),
- - INTx lines.</Note>
    </Notes>
    <CVE>CVE-2024-31146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:xen-libs-4.17.5_02-150500.3.36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.</Note>
    </Notes>
    <CVE>CVE-2024-38473</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-2.4.51-150400.6.34.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-prefork-2.4.51-150400.6.34.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-utils-2.4.51-150400.6.34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in
directories permitted by the configuration but not directly reachable by any  URL or source disclosure of scripts meant to only to be executed as CGI.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.

Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.</Note>
    </Notes>
    <CVE>CVE-2024-38474</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-2.4.51-150400.6.34.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-prefork-2.4.51-150400.6.34.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-utils-2.4.51-150400.6.34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.     "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.

Users are recommended to upgrade to version 2.4.61, which fixes this issue.</Note>
    </Notes>
    <CVE>CVE-2024-39884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-2.4.51-150400.6.34.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-prefork-2.4.51-150400.6.34.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:apache2-utils-2.4.51-150400.6.34.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in runc v1.1.14 and v1.2.0-rc3.

Some workarounds are available. Using user namespaces restricts this attack fairly significantly such that the attacker can only create inodes in directories that the remapped root user/group has write access to. Unless the root user is remapped to an actual
user on the host (such as with rootless containers that don't use `/etc/sub[ug]id`), this in practice means that an attacker would only be able to create inodes in world-writable directories. A strict enough SELinux or AppArmor policy could in principle also restrict the scope if a specific label is applied to the runc runtime, though neither the extent to which the standard existing policies block this attack nor what exact policies are needed to sufficiently restrict this attack have been thoroughly tested.</Note>
    </Notes>
    <CVE>CVE-2024-45310</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:runc-1.1.14-150000.70.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.</Note>
    </Notes>
    <CVE>CVE-2024-45490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:expat-2.4.4-150400.3.22.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libexpat-devel-2.4.4-150400.3.22.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libexpat1-2.4.4-150400.3.22.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).</Note>
    </Notes>
    <CVE>CVE-2024-45491</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:expat-2.4.4-150400.3.22.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libexpat-devel-2.4.4-150400.3.22.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libexpat1-2.4.4-150400.3.22.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).</Note>
    </Notes>
    <CVE>CVE-2024-45492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:expat-2.4.4-150400.3.22.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libexpat-devel-2.4.4-150400.3.22.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libexpat1-2.4.4-150400.3.22.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.</Note>
    </Notes>
    <CVE>CVE-2024-6345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:python3-setuptools-44.1.1-150400.9.9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.</Note>
    </Notes>
    <CVE>CVE-2024-7006</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libtiff5-4.0.9-150000.45.47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the *time fraction*, leading to
a `strlen()` getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.

This flaw most likely leads to a crash, but can also lead to heap contents
getting returned to the application when
[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.</Note>
    </Notes>
    <CVE>CVE-2024-7264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:curl-8.0.1-150400.5.50.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcurl-devel-8.0.1-150400.5.50.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcurl4-8.0.1-150400.5.50.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcurl4-32bit-8.0.1-150400.5.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.</Note>
    </Notes>
    <CVE>CVE-2024-8006</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libpcap1-1.10.1-150400.3.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine.  If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.</Note>
    </Notes>
    <CVE>CVE-2024-8096</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:curl-8.0.1-150400.5.50.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcurl-devel-8.0.1-150400.5.50.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcurl4-8.0.1-150400.5.50.1</ProductID>
        <ProductID>Public Cloud Image google/sles-15-sp5-sapcal-v20240913-x86-64:libcurl4-32bit-8.0.1-150400.5.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
  </Vulnerability>
</cvrfdoc>
