<link href="/user/plugins/datatables/assets/datatables.min.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/markdown-notices/assets/notices.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/form/assets/form-styles.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/simplesearch/css/simplesearch.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/highlight/css/default.css" type="text/css" rel="stylesheet"> <link href="/user/plugins/login/css/login.css" type="text/css" rel="stylesheet"> <link href="/user/themes/imagefactory/css/components.min.css" type="text/css" rel="stylesheet"> <link href="/user/themes/imagefactory/css/otc.css" type="text/css" rel="stylesheet"> <script src="/user/themes/imagefactory/js/jquery.min.js"></script> <script src="/user/plugins/datatables/assets/datatables.min.js"></script> <script src="/user/plugins/highlight/js/highlight.pack.js"></script> <script src="/user/themes/imagefactory/js/components.min.js"></script> <script src="/user/themes/imagefactory/js/totop.js"></script> <script> hljs.initHighlightingOnLoad(); </script>
Brand Claim Brand Claim
<h2>Windows</h2> <ul> <li> <p>updated Microsoft Windws Server Images with current Microsoft Windows Server Patches of November 2019 (12th) including fixes for CVE-2018-12207 and CVE-2019-11135</p> <ul> <li>Windows Server 2008 R2 <ul> <li>2019-11 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB4525233)</li> <li>2019-11 Cumulative Security Update for Internet Explorer 11 for Windows Server 2008 R2 for x64-based systems (KB4525106)</li> <li>2019-11 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems (KB4525235)</li> <li>2019-11 Servicing Stack Update for Windows Server 2008 R2 for x64-based Systems (KB4523206)</li> <li>Windows Malicious Software Removal Tool x64 - November 2019 (KB890830)</li> </ul></li> <li>Windows Server 2012 R2 <ul> <li>2019-11 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4525106)</li> <li>2019-11 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4525250)</li> <li>2019-11 Servicing Stack Update for Windows Server 2012 R2 for x64-based Systems (KB4524445)</li> <li>2019-11 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4525243)</li> <li>Windows Malicious Software Removal Tool x64 - November 2019 (KB890830)</li> </ul></li> <li>Windows Server 2016 <ul> <li>2019-11 Servicing Stack Update for Windows Server 2016 for x64-based Systems (KB4520724)</li> <li>2019-11 Cumulative Update for Windows Server 2016 for x64-based Systems (KB4525236)</li> <li>Windows Malicious Software Removal Tool x64 - November 2019 (KB890830)</li> </ul></li> <li>Windows Server 2019 <ul> <li>2019-11 Servicing Stack Update for Windows Server 2019 for x64-based Systems (KB4523204)</li> <li>2019-11 Cumulative Update for Windows Server 2019 for x64-based Systems (KB4523205)</li> <li>Windows Malicious Software Removal Tool x64 - November 2019 (KB890830)</li> </ul></li> </ul> </li> <li> <p>Driver and tools of all Windows Server types</p> <ul> <li>Cloudbase-Init: 0.9.12.dev86</li> <li>XEN GPL driver: 5.0.128.10</li> <li>KVM UVP Vmtools: 2.5.0.151</li> <li>Intel SRIOV (High Performance ) driver : Version 24.2, August 1, 2019</li> <li>NVIDIA vGPU driver: 370.39 (fixes CVE‑2019‑5683 - CVE‑2019‑5687)</li> <li>NVIDIA pGPU driver: 441.22 (fixes CVE‑2019‑5690 - CVE‑2019‑5693, CVE‑2019‑5695)</li> <li>NVIDIA V100 driver: 426.26 (fixes CVE‑2019‑5698)</li> </ul> </li> </ul> <h2>SUSE</h2> <ul> <li><strong>SLES15 SP0</strong> updated image released <ul> <li>A new and updated SLES15 SP0 image has been published.</li> <li>Our technology partner confirmed that the SCSI EVS volumes are known not to work for some of the BMS flavors including the physical.o2.medium. </li> <li>This is because of differences in the SD100 cards that are installed in some of those machines and the mounting of SCSI EVS volumes is not gauranteed to always work.</li> </ul></li> <li><strong>SLES-SAP-12_SP1_SAPHANA</strong> uses a workaround for BMS /boot mount issue <ul> <li>The new SLES-SAP-12_SP1_SAPHANA image has the /boot entry commented in /etc/fstab</li> <li>The /boot fstab entry <strong>MUST</strong> be kept commented to make the image work on BMS as it creates a race condition between systemd and dracut probably (needs more investigation)</li> <li>The /boot partition is mounted using a separate systemd service (boot_mount) and systems works normally</li> </ul></li> </ul>