Container summary for bci/bci-sle15-kernel-module-devel


SUSE-CU-2024:5281-1

Container Advisory IDSUSE-CU-2024:5281-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.28.7 , bci/bci-sle15-kernel-module-devel:latest
Container Release28.7
The following patches have been included in this update:

SUSE-CU-2024:5280-1

Container Advisory IDSUSE-CU-2024:5280-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.28.5 , bci/bci-sle15-kernel-module-devel:latest
Container Release28.5
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3726-1
ReleasedFri Oct 18 11:56:40 2024
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1231051
Description:

This update for glibc fixes the following issue:


SUSE-CU-2024:5279-1

Container Advisory IDSUSE-CU-2024:5279-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.28.4 , bci/bci-sle15-kernel-module-devel:latest
Container Release28.4
The following patches have been included in this update:

SUSE-CU-2024:5278-1

Container Advisory IDSUSE-CU-2024:5278-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.28.3 , bci/bci-sle15-kernel-module-devel:latest
Container Release28.3
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3659-1
ReleasedWed Oct 16 15:12:47 2024
SummaryRecommended update for gcc14
Typerecommended
Severitymoderate
References1188441,1210959,1214915,1219031,1220724,1221601
Description:

This update for gcc14 fixes the following issues:
This update ships the GNU Compiler Collection GCC 14.2. (jsc#PED-10474)
The compiler runtime libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 13 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP5 and SP6, and provided in the 'Development Tools' module.
The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories.
To use gcc14 compilers use:


For a full changelog with all new GCC14 features, check out
https://gcc.gnu.org/gcc-14/changes.html



SUSE-CU-2024:5146-1

Container Advisory IDSUSE-CU-2024:5146-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.28.2 , bci/bci-sle15-kernel-module-devel:latest
Container Release28.2
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3609-1
ReleasedMon Oct 14 11:39:13 2024
SummaryRecommended update for SLES-release
Typerecommended
Severitymoderate
References1227100,1230135
Description:

This update for SLES-release fixes the following issues:


SUSE-CU-2024:5056-1

Container Advisory IDSUSE-CU-2024:5056-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.27.11 , bci/bci-sle15-kernel-module-devel:latest
Container Release27.11
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3597-1
ReleasedFri Oct 11 10:39:52 2024
SummaryRecommended update for bash
Typerecommended
Severitymoderate
References1227807
Description:

This update for bash fixes the following issues:


SUSE-CU-2024:5055-1

Container Advisory IDSUSE-CU-2024:5055-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.27.10 , bci/bci-sle15-kernel-module-devel:latest
Container Release27.10
The following patches have been included in this update:

SUSE-CU-2024:4958-1

Container Advisory IDSUSE-CU-2024:4958-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.27.8 , bci/bci-sle15-kernel-module-devel:latest
Container Release27.8
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:3561-1
ReleasedWed Oct 9 10:45:11 2024
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1012628,1183045,1215199,1216223,1216776,1220382,1221527,1221610,1221650,1222629,1223600,1223848,1225487,1225812,1225903,1226003,1226507,1226606,1226666,1226846,1226860,1227487,1227694,1227726,1227819,1227885,1227890,1227962,1228090,1228140,1228244,1228507,1228771,1229001,1229004,1229019,1229086,1229167,1229169,1229289,1229334,1229362,1229363,1229364,1229371,1229380,1229389,1229394,1229429,1229443,1229452,1229455,1229456,1229494,1229585,1229753,1229764,1229768,1229790,1229810,1229899,1229928,1230015,1230119,1230123,1230124,1230125,1230169,1230170,1230171,1230173,1230174,1230175,1230176,1230178,1230180,1230181,1230185,1230191,1230192,1230193,1230194,1230195,1230200,1230204,1230206,1230207,1230209,1230211,1230213,1230217,1230221,1230224,1230230,1230232,1230233,1230240,1230244,1230245,1230247,1230248,1230269,1230270,1230295,1230340,1230426,1230430,1230431,1230432,1230433,1230434,1230435,1230440,1230441,1230442,1230444,1230450,1230451,1230454,1230455,1230457,1230459,1230506,1230507,1230511,1230515,1230517,1230518,1230519,1230520,1230521,1230524,1230526,1230533,1230535,1230539,1230540,1230549,1230556,1230562,1230563,1230564,1230580,1230582,1230589,1230602,1230699,1230700,1230701,1230702,1230703,1230704,1230705,1230706,1230709,1230711,1230712,1230715,1230719,1230722,1230724,1230725,1230726,1230727,1230730,1230731,1230732,1230747,1230748,1230749,1230751,1230752,1230753,1230756,1230761,1230766,1230767,1230768,1230771,1230772,1230775,1230776,1230780,1230783,1230786,1230787,1230791,1230794,1230796,1230802,1230806,1230808,1230809,1230810,1230812,1230813,1230814,1230815,1230821,1230825,1230830,1230831,1230854,1230948,1231008,1231035,1231120,1231146,1231182,1231183,CVE-2023-52610,CVE-2023-52752,CVE-2023-52915,CVE-2023-52916,CVE-2024-26640,CVE-2024-26759,CVE-2024-26804,CVE-2024-36953,CVE-2024-38538,CVE-2024-38596,CVE-2024-38632,CVE-2024-40965,CVE-2024-40973,CVE-2024-40983,CVE-2024-42154,CVE-2024-42243,CVE-2024-42252,CVE-2024-42265,CVE-2024-42294,CVE-2024-42304,CVE-2024-42305,CVE-2024-42306,CVE-2024-43828,CVE-2024-43832,CVE-2024-43835,CVE-2024-43845,CVE-2024-43870,CVE-2024-43890,CVE-2024-43898,CVE-2024-43904,CVE-2024-43914,CVE-2024-44935,CVE-2024-44944,CVE-2024-44946,CVE-2024-44947,CVE-2024-44948,CVE-2024-44950,CVE-2024-44951,CVE-2024-44952,CVE-2024-44954,CVE-2024-44960,CVE-2024-44961,CVE-2024-44962,CVE-2024-44965,CVE-2024-44967,CVE-2024-44969,CVE-2024-44970,CVE-2024-44971,CVE-2024-44977,CVE-2024-44982,CVE-2024-44984,CVE-2024-44985,CVE-2024-44986,CVE-2024-44987,CVE-2024-44988,CVE-2024-44989,CVE-2024-44990,CVE-2024-44991,CVE-2024-44997,CVE-2024-44998,CVE-2024-44999,CVE-2024-45000,CVE-2024-45001,CVE-2024-45002,CVE-2024-45003,CVE-2024-45005,CVE-2024-45006,CVE-2024-45007,CVE-2024-45008,CVE-2024-45011,CVE-2024-45012,CVE-2024-45013,CVE-2024-45015,CVE-2024-45017,CVE-2024-45018,CVE-2024-45019,CVE-2024-45020,CVE-2024-45021,CVE-2024-45022,CVE-2024-45023,CVE-2024-45026,CVE-2024-45028,CVE-2024-45029,CVE-2024-45030,CVE-2024-46672,CVE-2024-46673,CVE-2024-46674,CVE-2024-46675,CVE-2024-46676,CVE-2024-46677,CVE-2024-46679,CVE-2024-46685,CVE-2024-46686,CVE-2024-46687,CVE-2024-46689,CVE-2024-46691,CVE-2024-46692,CVE-2024-46693,CVE-2024-46694,CVE-2024-46695,CVE-2024-46702,CVE-2024-46706,CVE-2024-46707,CVE-2024-46709,CVE-2024-46710,CVE-2024-46714,CVE-2024-46715,CVE-2024-46716,CVE-2024-46717,CVE-2024-46719,CVE-2024-46720,CVE-2024-46722,CVE-2024-46723,CVE-2024-46724,CVE-2024-46725,CVE-2024-46726,CVE-2024-46728,CVE-2024-46729,CVE-2024-46730,CVE-2024-46731,CVE-2024-46732,CVE-2024-46734,CVE-2024-46735,CVE-2024-46737,CVE-2024-46738,CVE-2024-46739,CVE-2024-46741,CVE-2024-46743,CVE-2024-46744,CVE-2024-46745,CVE-2024-46746,CVE-2024-46747,CVE-2024-46749,CVE-2024-46750,CVE-2024-46751,CVE-2024-46752,CVE-2024-46753,CVE-2024-46755,CVE-2024-46756,CVE-2024-46757,CVE-2024-46758,CVE-2024-46759,CVE-2024-46760,CVE-2024-46761,CVE-2024-46767,CVE-2024-46771,CVE-2024-46772,CVE-2024-46773,CVE-2024-46774,CVE-2024-46776,CVE-2024-46778,CVE-2024-46780,CVE-2024-46781,CVE-2024-46783,CVE-2024-46784,CVE-2024-46786,CVE-2024-46787,CVE-2024-46791,CVE-2024-46794,CVE-2024-46797,CVE-2024-46798,CVE-2024-46822
Description:


The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:


The following non-security bugs were fixed:


SUSE-CU-2024:4889-1

Container Advisory IDSUSE-CU-2024:4889-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.27.7 , bci/bci-sle15-kernel-module-devel:latest
Container Release27.7
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3528-1
ReleasedFri Oct 4 15:31:43 2024
SummaryRecommended update for e2fsprogs
Typerecommended
Severitymoderate
References1230145
Description:

This update for e2fsprogs fixes the following issue:


SUSE-CU-2024:4817-1

Container Advisory IDSUSE-CU-2024:4817-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.27.4 , bci/bci-sle15-kernel-module-devel:latest
Container Release27.4
The following patches have been included in this update:

SUSE-CU-2024:4816-1

Container Advisory IDSUSE-CU-2024:4816-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.27.3 , bci/bci-sle15-kernel-module-devel:latest
Container Release27.3
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:3501-1
ReleasedTue Oct 1 16:03:34 2024
SummarySecurity update for openssl-3
Typesecurity
Severityimportant
References1230698,CVE-2024-41996
Description:

This update for openssl-3 fixes the following issues:


Advisory IDSUSE-RU-2024:3504-1
ReleasedTue Oct 1 16:22:27 2024
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1230638
Description:

This update for glibc fixes the following issue:


SUSE-CU-2024:4696-1

Container Advisory IDSUSE-CU-2024:4696-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.26.3 , bci/bci-sle15-kernel-module-devel:latest
Container Release26.3
The following patches have been included in this update:

SUSE-CU-2024:4695-1

Container Advisory IDSUSE-CU-2024:4695-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.26.2 , bci/bci-sle15-kernel-module-devel:latest
Container Release26.2
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:3470-1
ReleasedFri Sep 27 14:34:46 2024
SummarySecurity update for python3
Typesecurity
Severityimportant
References1227233,1227378,1227999,1228780,1229596,1230227,CVE-2024-5642,CVE-2024-6232,CVE-2024-6923,CVE-2024-7592
Description:

This update for python3 fixes the following issues:


Bug fixes:


SUSE-CU-2024:4634-1

Container Advisory IDSUSE-CU-2024:4634-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.26.1 , bci/bci-sle15-kernel-module-devel:latest
Container Release26.1
The following patches have been included in this update:

SUSE-CU-2024:4500-1

Container Advisory IDSUSE-CU-2024:4500-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.24.6 , bci/bci-sle15-kernel-module-devel:latest
Container Release24.6
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3300-1
ReleasedWed Sep 18 14:27:53 2024
SummaryRecommended update for ncurses
Typerecommended
Severitymoderate
References1229028
Description:

This update for ncurses fixes the following issues:


Advisory IDSUSE-SU-2024:3383-1
ReleasedMon Sep 23 10:29:54 2024
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1012628,1193454,1194869,1205462,1208783,1213123,1214285,1215199,1220066,1220252,1220877,1221326,1221630,1221645,1221652,1221857,1222254,1222335,1222350,1222364,1222372,1222387,1222433,1222434,1222463,1222625,1222633,1222634,1222808,1222967,1222973,1223053,1223074,1223191,1223395,1223635,1223720,1223731,1223742,1223763,1223767,1223777,1223803,1224105,1224415,1224485,1224496,1224510,1224535,1224631,1224636,1224690,1224694,1224700,1224711,1225475,1225582,1225607,1225717,1225718,1225744,1225745,1225751,1225814,1225832,1225838,1225903,1226031,1226127,1226502,1226530,1226588,1226604,1226743,1226751,1226765,1226798,1226801,1226834,1226874,1226885,1226920,1227149,1227182,1227383,1227437,1227492,1227493,1227494,1227618,1227620,1227623,1227627,1227634,1227706,1227722,1227724,1227725,1227728,1227729,1227732,1227733,1227734,1227747,1227750,1227754,1227758,1227760,1227761,1227764,1227766,1227770,1227771,1227772,1227774,1227781,1227784,1227785,1227787,1227790,1227791,1227792,1227796,1227798,1227799,1227802,1227808,1227810,1227811,1227812,1227815,1227816,1227818,1227820,1227823,1227824,1227826,1227828,1227829,1227830,1227832,1227833,1227834,1227839,1227840,1227846,1227849,1227851,1227853,1227863,1227864,1227865,1227867,1227869,1227870,1227883,1227884,1227891,1227893,1227929,1227950,1227957,1227981,1228020,1228021,1228114,1228192,1228195,1228202,1228235,1228236,1228237,1228247,1228321,1228409,1228410,1228426,1228427,1228429,1228446,1228447,1228449,1228450,1228452,1228456,1228457,1228458,1228459,1228460,1228462,1228463,1228466,1228467,1228468,1228469,1228470,1228472,1228479,1228480,1228481,1228482,1228483,1228484,1228485,1228486,1228487,1228489,1228491,1228492,1228493,1228494,1228495,1228496,1228499,1228500,1228501,1228502,1228503,1228505,1228508,1228509,1228510,1228511,1228513,1228515,1228516,1228518,1228520,1228525,1228527,1228530,1228531,1228539,1228561,1228563,1228564,1228565,1228567,1228568,1228572,1228576,1228579,1228580,1228581,1228582,1228584,1228586,1228588,1228590,1228591,1228599,1228615,1228616,1228617,1228625,1228626,1228633,1228635,1228636,1228640,1228643,1228644,1228646,1228649,1228650,1228654,1228655,1228656,1228658,1228660,1228662,1228665,1228666,1228667,1228672,1228673,1228674,1228677,1228680,1228687,1228705,1228706,1228707,1228708,1228709,1228710,1228718,1228720,1228721,1228722,1228723,1228724,1228726,1228727,1228733,1228737,1228743,1228748,1228754,1228756,1228757,1228758,1228764,1228766,1228779,1228801,1228849,1228850,1228857,1228959,1228964,1228966,1228967,1228973,1228977,1228978,1228979,1228986,1228988,1228989,1228991,1228992,1229005,1229024,1229042,1229045,1229046,1229054,1229056,1229086,1229134,1229136,1229154,1229156,1229160,1229167,1229168,1229169,1229170,1229171,1229172,1229173,1229174,1229239,1229240,1229241,1229243,1229244,1229245,1229246,1229247,1229248,1229249,1229250,1229251,1229252,1229253,1229254,1229255,1229256,1229287,1229290,1229291,1229292,1229294,1229296,1229297,1229298,1229299,1229301,1229303,1229304,1229305,1229307,1229309,1229312,1229313,1229314,1229315,1229316,1229317,1229318,1229319,1229320,1229327,1229341,1229342,1229344,1229345,1229346,1229347,1229349,1229350,1229351,1229353,1229354,1229355,1229356,1229357,1229358,1229359,1229360,1229365,1229366,1229369,1229370,1229373,1229374,1229379,1229381,1229382,1229383,1229386,1229388,1229390,1229391,1229392,1229395,1229398,1229399,1229400,1229402,1229403,1229404,1229407,1229409,1229410,1229411,1229413,1229414,1229417,1229444,1229451,1229452,1229455,1229456,1229480,1229481,1229482,1229484,1229485,1229486,1229487,1229488,1229489,1229490,1229493,1229495,1229496,1229497,1229500,1229503,1229707,1229739,1229743,1229746,1229747,1229752,1229754,1229755,1229756,1229759,1229761,1229767,1229781,1229784,1229785,1229787,1229788,1229789,1229792,1229820,1229827,1229830,1229837,1229940,1230056,1230350,1230413,CVE-2023-52489,CVE-2023-52581,CVE-2023-52668,CVE-2023-52688,CVE-2023-52735,CVE-2023-52859,CVE-2023-52885,CVE-2023-52886,CVE-2023-52887,CVE-2023-52889,CVE-2024-26590,CVE-2024-26631,CVE-2024-26637,CVE-2024-26668,CVE-2024-26669,CVE-2024-26677,CVE-2024-26682,CVE-2024-26683,CVE-2024-26691,CVE-2024-26735,CVE-2024-26808,CVE-2024-26809,CVE-2024-26812,CVE-2024-26835,CVE-2024-26837,CVE-2024-26849,CVE-2024-26851,CVE-2024-26889,CVE-2024-26920,CVE-2024-26944,CVE-2024-26976,CVE-2024-27010,CVE-2024-27011,CVE-2024-27024,CVE-2024-27049,CVE-2024-27050,CVE-2024-27079,CVE-2024-27403,CVE-2024-27433,CVE-2024-27437,CVE-2024-31076,CVE-2024-35854,CVE-2024-35855,CVE-2024-35897,CVE-2024-35902,CVE-2024-35913,CVE-2024-35939,CVE-2024-35949,CVE-2024-36270,CVE-2024-36286,CVE-2024-36288,CVE-2024-36489,CVE-2024-36881,CVE-2024-36907,CVE-2024-36909,CVE-2024-36910,CVE-2024-36911,CVE-2024-36929,CVE-2024-36933,CVE-2024-36939,CVE-2024-36970,CVE-2024-36979,CVE-2024-38548,CVE-2024-38563,CVE-2024-38609,CVE-2024-38662,CVE-2024-39476,CVE-2024-39483,CVE-2024-39484,CVE-2024-39486,CVE-2024-39488,CVE-2024-39489,CVE-2024-39491,CVE-2024-39493,CVE-2024-39497,CVE-2024-39499,CVE-2024-39500,CVE-2024-39501,CVE-2024-39505,CVE-2024-39506,CVE-2024-39508,CVE-2024-39509,CVE-2024-39510,CVE-2024-40899,CVE-2024-40900,CVE-2024-40902,CVE-2024-40903,CVE-2024-40904,CVE-2024-40905,CVE-2024-40909,CVE-2024-40910,CVE-2024-40911,CVE-2024-40912,CVE-2024-40913,CVE-2024-40916,CVE-2024-40920,CVE-2024-40921,CVE-2024-40922,CVE-2024-40924,CVE-2024-40926,CVE-2024-40927,CVE-2024-40929,CVE-2024-40930,CVE-2024-40932,CVE-2024-40934,CVE-2024-40936,CVE-2024-40938,CVE-2024-40939,CVE-2024-40941,CVE-2024-40942,CVE-2024-40943,CVE-2024-40944,CVE-2024-40945,CVE-2024-40954,CVE-2024-40956,CVE-2024-40957,CVE-2024-40958,CVE-2024-40959,CVE-2024-40962,CVE-2024-40964,CVE-2024-40967,CVE-2024-40976,CVE-2024-40977,CVE-2024-40978,CVE-2024-40981,CVE-2024-40982,CVE-2024-40984,CVE-2024-40987,CVE-2024-40988,CVE-2024-40989,CVE-2024-40990,CVE-2024-40992,CVE-2024-40994,CVE-2024-40995,CVE-2024-40997,CVE-2024-41000,CVE-2024-41001,CVE-2024-41002,CVE-2024-41004,CVE-2024-41007,CVE-2024-41009,CVE-2024-41010,CVE-2024-41011,CVE-2024-41012,CVE-2024-41015,CVE-2024-41016,CVE-2024-41020,CVE-2024-41022,CVE-2024-41024,CVE-2024-41025,CVE-2024-41028,CVE-2024-41032,CVE-2024-41035,CVE-2024-41036,CVE-2024-41037,CVE-2024-41038,CVE-2024-41039,CVE-2024-41040,CVE-2024-41041,CVE-2024-41044,CVE-2024-41045,CVE-2024-41048,CVE-2024-41049,CVE-2024-41050,CVE-2024-41051,CVE-2024-41056,CVE-2024-41057,CVE-2024-41058,CVE-2024-41059,CVE-2024-41060,CVE-2024-41061,CVE-2024-41062,CVE-2024-41063,CVE-2024-41064,CVE-2024-41065,CVE-2024-41066,CVE-2024-41068,CVE-2024-41069,CVE-2024-41070,CVE-2024-41071,CVE-2024-41072,CVE-2024-41073,CVE-2024-41074,CVE-2024-41075,CVE-2024-41076,CVE-2024-41078,CVE-2024-41079,CVE-2024-41080,CVE-2024-41081,CVE-2024-41084,CVE-2024-41087,CVE-2024-41088,CVE-2024-41089,CVE-2024-41092,CVE-2024-41093,CVE-2024-41094,CVE-2024-41095,CVE-2024-41096,CVE-2024-41097,CVE-2024-41098,CVE-2024-42064,CVE-2024-42069,CVE-2024-42070,CVE-2024-42073,CVE-2024-42074,CVE-2024-42076,CVE-2024-42077,CVE-2024-42079,CVE-2024-42080,CVE-2024-42082,CVE-2024-42085,CVE-2024-42086,CVE-2024-42087,CVE-2024-42089,CVE-2024-42090,CVE-2024-42092,CVE-2024-42093,CVE-2024-42095,CVE-2024-42096,CVE-2024-42097,CVE-2024-42098,CVE-2024-42101,CVE-2024-42104,CVE-2024-42105,CVE-2024-42106,CVE-2024-42107,CVE-2024-42109,CVE-2024-42110,CVE-2024-42113,CVE-2024-42114,CVE-2024-42115,CVE-2024-42117,CVE-2024-42119,CVE-2024-42120,CVE-2024-42121,CVE-2024-42122,CVE-2024-42124,CVE-2024-42125,CVE-2024-42126,CVE-2024-42127,CVE-2024-42130,CVE-2024-42131,CVE-2024-42132,CVE-2024-42133,CVE-2024-42136,CVE-2024-42137,CVE-2024-42138,CVE-2024-42139,CVE-2024-42141,CVE-2024-42142,CVE-2024-42143,CVE-2024-42144,CVE-2024-42145,CVE-2024-42147,CVE-2024-42148,CVE-2024-42152,CVE-2024-42153,CVE-2024-42155,CVE-2024-42156,CVE-2024-42157,CVE-2024-42158,CVE-2024-42159,CVE-2024-42161,CVE-2024-42162,CVE-2024-42223,CVE-2024-42224,CVE-2024-42225,CVE-2024-42226,CVE-2024-42227,CVE-2024-42228,CVE-2024-42229,CVE-2024-42230,CVE-2024-42232,CVE-2024-42236,CVE-2024-42237,CVE-2024-42238,CVE-2024-42239,CVE-2024-42240,CVE-2024-42241,CVE-2024-42244,CVE-2024-42245,CVE-2024-42246,CVE-2024-42247,CVE-2024-42250,CVE-2024-42253,CVE-2024-42259,CVE-2024-42268,CVE-2024-42269,CVE-2024-42270,CVE-2024-42271,CVE-2024-42274,CVE-2024-42276,CVE-2024-42277,CVE-2024-42278,CVE-2024-42279,CVE-2024-42280,CVE-2024-42281,CVE-2024-42283,CVE-2024-42284,CVE-2024-42285,CVE-2024-42286,CVE-2024-42287,CVE-2024-42288,CVE-2024-42289,CVE-2024-42290,CVE-2024-42291,CVE-2024-42292,CVE-2024-42295,CVE-2024-42298,CVE-2024-42301,CVE-2024-42302,CVE-2024-42303,CVE-2024-42308,CVE-2024-42309,CVE-2024-42310,CVE-2024-42311,CVE-2024-42312,CVE-2024-42313,CVE-2024-42314,CVE-2024-42315,CVE-2024-42316,CVE-2024-42318,CVE-2024-42319,CVE-2024-42320,CVE-2024-42322,CVE-2024-43816,CVE-2024-43817,CVE-2024-43818,CVE-2024-43819,CVE-2024-43821,CVE-2024-43823,CVE-2024-43824,CVE-2024-43825,CVE-2024-43826,CVE-2024-43829,CVE-2024-43830,CVE-2024-43831,CVE-2024-43833,CVE-2024-43834,CVE-2024-43837,CVE-2024-43839,CVE-2024-43840,CVE-2024-43841,CVE-2024-43842,CVE-2024-43846,CVE-2024-43847,CVE-2024-43849,CVE-2024-43850,CVE-2024-43851,CVE-2024-43853,CVE-2024-43854,CVE-2024-43855,CVE-2024-43856,CVE-2024-43858,CVE-2024-43860,CVE-2024-43861,CVE-2024-43863,CVE-2024-43864,CVE-2024-43866,CVE-2024-43867,CVE-2024-43871,CVE-2024-43872,CVE-2024-43873,CVE-2024-43874,CVE-2024-43875,CVE-2024-43876,CVE-2024-43877,CVE-2024-43879,CVE-2024-43880,CVE-2024-43881,CVE-2024-43882,CVE-2024-43883,CVE-2024-43884,CVE-2024-43885,CVE-2024-43889,CVE-2024-43892,CVE-2024-43893,CVE-2024-43894,CVE-2024-43895,CVE-2024-43897,CVE-2024-43899,CVE-2024-43900,CVE-2024-43902,CVE-2024-43903,CVE-2024-43905,CVE-2024-43906,CVE-2024-43907,CVE-2024-43908,CVE-2024-43909,CVE-2024-43911,CVE-2024-43912,CVE-2024-44931,CVE-2024-44938,CVE-2024-44939
Description:


The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:



The following non-security bugs were fixed:


SUSE-CU-2024:4410-1

Container Advisory IDSUSE-CU-2024:4410-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.24.5 , bci/bci-sle15-kernel-module-devel:latest
Container Release24.5
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3317-1
ReleasedWed Sep 18 16:38:50 2024
SummaryRecommended update for fipscheck
Typerecommended
Severitymoderate
References1221714
Description:

This update for fipscheck fixes the following issue:


SUSE-CU-2024:4369-1

Container Advisory IDSUSE-CU-2024:4369-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.24.3 , bci/bci-sle15-kernel-module-devel:latest
Container Release24.3
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3239-1
ReleasedFri Sep 13 12:00:58 2024
SummaryRecommended update for util-linux
Typerecommended
Severitymoderate
References1229476
Description:

This update for util-linux fixes the following issue:


SUSE-CU-2024:4343-1

Container Advisory IDSUSE-CU-2024:4343-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.24.1 , bci/bci-sle15-kernel-module-devel:latest
Container Release24.1
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:3216-1
ReleasedThu Sep 12 13:05:20 2024
SummarySecurity update for expat
Typesecurity
Severitymoderate
References1229930,1229931,1229932,CVE-2024-45490,CVE-2024-45491,CVE-2024-45492
Description:

This update for expat fixes the following issues:


SUSE-CU-2024:4249-1

Container Advisory IDSUSE-CU-2024:4249-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.23.7 , bci/bci-sle15-kernel-module-devel:latest
Container Release23.7
The following patches have been included in this update:

SUSE-CU-2024:4165-1

Container Advisory IDSUSE-CU-2024:4165-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.23.6 , bci/bci-sle15-kernel-module-devel:latest
Container Release23.6
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3166-1
ReleasedMon Sep 9 12:25:30 2024
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1228042
Description:

This update for glibc fixes the following issue:


Advisory IDSUSE-RU-2024:3180-1
ReleasedMon Sep 9 14:50:18 2024
SummaryRecommended update for binutils
Typerecommended
Severitymoderate
References1215341,1216908
Description:

This update for binutils fixes the following issues:
Update to current 2.43.1 branch [jsc#PED-10474]:
Update to version 2.43:


Update to version 2.42:


SUSE-CU-2024:4059-1

Container Advisory IDSUSE-CU-2024:4059-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.23.4 , bci/bci-sle15-kernel-module-devel:latest
Container Release23.4
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:3106-1
ReleasedTue Sep 3 17:00:40 2024
SummarySecurity update for openssl-3
Typesecurity
Severitymoderate
References1220523,1220690,1220693,1220696,1221365,1221751,1221752,1221753,1221760,1221786,1221787,1221821,1221822,1221824,1221827,1229465,CVE-2024-6119
Description:

This update for openssl-3 fixes the following issues:


Other fixes:


Advisory IDSUSE-RU-2024:3131-1
ReleasedTue Sep 3 17:42:24 2024
SummaryRecommended update for mozilla-nss
Typerecommended
Severitymoderate
References1224113
Description:

This update for mozilla-nss fixes the following issues:


Advisory IDSUSE-RU-2024:3132-1
ReleasedTue Sep 3 17:43:10 2024
SummaryRecommended update for permissions
Typerecommended
Severitymoderate
References1228968,1229329
Description:

This update for permissions fixes the following issues:



SUSE-CU-2024:3951-1

Container Advisory IDSUSE-CU-2024:3951-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.23.3 , bci/bci-sle15-kernel-module-devel:latest
Container Release23.3
The following patches have been included in this update:

SUSE-CU-2024:3875-1

Container Advisory IDSUSE-CU-2024:3875-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.23.2 , bci/bci-sle15-kernel-module-devel:latest
Container Release23.2
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2967-1
ReleasedMon Aug 19 15:41:29 2024
SummaryRecommended update for pam
Typerecommended
Severitymoderate
References1194818
Description:

This update for pam fixes the following issue:


SUSE-CU-2024:3781-1

Container Advisory IDSUSE-CU-2024:3781-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.22.1 , bci/bci-sle15-kernel-module-devel:latest
Container Release22.1
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2933-1
ReleasedThu Aug 15 12:12:50 2024
SummarySecurity update for openssl-1_1
Typesecurity
Severitymoderate
References1225907,1226463,1227138,CVE-2024-5535
Description:

This update for openssl-1_1 fixes the following issues:


Other fixes:


SUSE-CU-2024:3693-1

Container Advisory IDSUSE-CU-2024:3693-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.21.4 , bci/bci-sle15-kernel-module-devel:latest
Container Release21.4
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2888-1
ReleasedTue Aug 13 11:07:41 2024
SummaryRecommended update for util-linux
Typerecommended
Severitymoderate
References1159034,1194818,1218609,1222285
Description:

This update for util-linux fixes the following issues:


SUSE-CU-2024:3627-1

Container Advisory IDSUSE-CU-2024:3627-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.21.2 , bci/bci-sle15-kernel-module-devel:latest
Container Release21.2
The following patches have been included in this update:

SUSE-CU-2024:3557-1

Container Advisory IDSUSE-CU-2024:3557-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.19.5 , bci/bci-sle15-kernel-module-devel:latest
Container Release19.5
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2802-1
ReleasedWed Aug 7 09:46:02 2024
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1194869,1215199,1215587,1218442,1218730,1218820,1219832,1220138,1220427,1220430,1220942,1221057,1221647,1221654,1221656,1221659,1222326,1222328,1222438,1222463,1222768,1222775,1222779,1222893,1223010,1223021,1223570,1223731,1223740,1223778,1223804,1223806,1223807,1223813,1223815,1223836,1223863,1224414,1224422,1224490,1224499,1224512,1224516,1224544,1224545,1224589,1224604,1224636,1224641,1224743,1224767,1225088,1225172,1225272,1225489,1225600,1225601,1225711,1225717,1225719,1225744,1225745,1225746,1225752,1225753,1225757,1225805,1225810,1225830,1225835,1225839,1225840,1225843,1225847,1225851,1225856,1225894,1225895,1225896,1226202,1226213,1226502,1226519,1226750,1226757,1226783,1226866,1226883,1226915,1226993,1227103,1227149,1227282,1227362,1227363,1227383,1227432,1227433,1227434,1227435,1227443,1227446,1227447,1227487,1227573,1227626,1227716,1227719,1227723,1227730,1227736,1227755,1227757,1227762,1227763,1227779,1227780,1227783,1227786,1227788,1227789,1227797,1227800,1227801,1227803,1227806,1227813,1227814,1227836,1227855,1227862,1227866,1227886,1227899,1227910,1227913,1227926,1228090,1228192,1228193,1228211,1228269,1228289,1228327,1228328,1228403,1228405,1228408,1228417,CVE-2023-38417,CVE-2023-47210,CVE-2023-51780,CVE-2023-52435,CVE-2023-52472,CVE-2023-52751,CVE-2023-52775,CVE-2024-25741,CVE-2024-26615,CVE-2024-26623,CVE-2024-26633,CVE-2024-26635,CVE-2024-26636,CVE-2024-26641,CVE-2024-26663,CVE-2024-26665,CVE-2024-26691,CVE-2024-26734,CVE-2024-26785,CVE-2024-26826,CVE-2024-26863,CVE-2024-26944,CVE-2024-27012,CVE-2024-27015,CVE-2024-27016,CVE-2024-27019,CVE-2024-27020,CVE-2024-27025,CVE-2024-27064,CVE-2024-27065,CVE-2024-27402,CVE-2024-27404,CVE-2024-35805,CVE-2024-35853,CVE-2024-35854,CVE-2024-35890,CVE-2024-35893,CVE-2024-35899,CVE-2024-35908,CVE-2024-35934,CVE-2024-35942,CVE-2024-36003,CVE-2024-36004,CVE-2024-36889,CVE-2024-36901,CVE-2024-36902,CVE-2024-36909,CVE-2024-36910,CVE-2024-36911,CVE-2024-36912,CVE-2024-36913,CVE-2024-36914,CVE-2024-36922,CVE-2024-36930,CVE-2024-36940,CVE-2024-36941,CVE-2024-36942,CVE-2024-36944,CVE-2024-36946,CVE-2024-36947,CVE-2024-36949,CVE-2024-36950,CVE-2024-36951,CVE-2024-36955,CVE-2024-36959,CVE-2024-36974,CVE-2024-38558,CVE-2024-38586,CVE-2024-38598,CVE-2024-38604,CVE-2024-38659,CVE-2024-39276,CVE-2024-39468,CVE-2024-39472,CVE-2024-39473,CVE-2024-39474,CVE-2024-39475,CVE-2024-39479,CVE-2024-39481,CVE-2024-39482,CVE-2024-39487,CVE-2024-39490,CVE-2024-39494,CVE-2024-39496,CVE-2024-39498,CVE-2024-39502,CVE-2024-39504,CVE-2024-39507,CVE-2024-40901,CVE-2024-40906,CVE-2024-40908,CVE-2024-40919,CVE-2024-40923,CVE-2024-40925,CVE-2024-40928,CVE-2024-40931,CVE-2024-40935,CVE-2024-40937,CVE-2024-40940,CVE-2024-40947,CVE-2024-40948,CVE-2024-40953,CVE-2024-40960,CVE-2024-40961,CVE-2024-40966,CVE-2024-40970,CVE-2024-40972,CVE-2024-40975,CVE-2024-40979,CVE-2024-40998,CVE-2024-40999,CVE-2024-41006,CVE-2024-41011,CVE-2024-41013,CVE-2024-41014,CVE-2024-41017,CVE-2024-41090,CVE-2024-41091
Description:


The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:


The following non-security bugs were fixed:


Advisory IDSUSE-SU-2024:2808-1
ReleasedWed Aug 7 09:49:32 2024
SummarySecurity update for shadow
Typesecurity
Severitymoderate
References1228770,CVE-2013-4235
Description:

This update for shadow fixes the following issues:


SUSE-CU-2024:3556-1

Container Advisory IDSUSE-CU-2024:3556-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.19.3 , bci/bci-sle15-kernel-module-devel:latest
Container Release19.3
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2779-1
ReleasedTue Aug 6 14:35:49 2024
SummaryRecommended update for permissions
Typerecommended
Severitymoderate
References1228548
Description:


This update for permissions fixes the following issue:


Advisory IDSUSE-SU-2024:2780-1
ReleasedTue Aug 6 14:36:01 2024
SummarySecurity update for patch
Typesecurity
Severitylow
References1167721,CVE-2019-20633
Description:

This update for patch fixes the following issues:


SUSE-CU-2024:3410-1

Container Advisory IDSUSE-CU-2024:3410-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.18.1 , bci/bci-sle15-kernel-module-devel:latest
Container Release18.1
The following patches have been included in this update:

SUSE-CU-2024:3347-1

Container Advisory IDSUSE-CU-2024:3347-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.17.17 , bci/bci-sle15-kernel-module-devel:latest
Container Release17.17
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2684-1
ReleasedWed Jul 31 20:04:41 2024
SummaryRecommended update for mozilla-nss
Typerecommended
Severitymoderate
References1214980,1222804,1222807,1222811,1222813,1222814,1222821,1222822,1222826,1222828,1222830,1222833,1222834,1223724,1224113,1224115,1224116,1224118,1227918,CVE-2023-5388
Description:

This update for mozilla-nss fixes the following issues:




Update to NSS 3.101.2:



update to NSS 3.101.1:

update to NSS 3.101:


Update to NSS 3.100:

Update to NSS 3.99:

Update to NSS 3.98:

Update to NSS 3.97:

Update to NSS 3.96.1:

Update to NSS 3.95:

Update to NSS 3.94:

Update to NSS 3.93:

Update to NSS 3.92:

Update to NSS 3.91:

Update to NSS 3.90.3:


SUSE-CU-2024:3308-1

Container Advisory IDSUSE-CU-2024:3308-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.17.16 , bci/bci-sle15-kernel-module-devel:latest
Container Release17.16
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2630-1
ReleasedTue Jul 30 09:12:44 2024
SummarySecurity update for shadow
Typesecurity
Severityimportant
References916845,CVE-2013-4235
Description:

This update for shadow fixes the following issues:


Advisory IDSUSE-SU-2024:2635-1
ReleasedTue Jul 30 09:14:09 2024
SummarySecurity update for openssl-3
Typesecurity
Severityimportant
References1222899,1223336,1226463,1227138,CVE-2024-5535
Description:

This update for openssl-3 fixes the following issues:
Security fixes:


Other fixes:


SUSE-CU-2024:3247-1

Container Advisory IDSUSE-CU-2024:3247-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.17.15 , bci/bci-sle15-kernel-module-devel:latest
Container Release17.15
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2571-1
ReleasedMon Jul 22 12:34:16 2024
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1186716,1195775,1204562,1209834,1217481,1217912,1218442,1219224,1219478,1219596,1219633,1219847,1219953,1221086,1221777,1221958,1222011,1222015,1222080,1222241,1222380,1222588,1222617,1222619,1222809,1222810,1223018,1223265,1224049,1224187,1224439,1224497,1224498,1224515,1224520,1224523,1224539,1224540,1224549,1224572,1224575,1224583,1224584,1224606,1224612,1224614,1224619,1224655,1224659,1224661,1224662,1224670,1224673,1224698,1224735,1224751,1224759,1224928,1224930,1224932,1224933,1224935,1224937,1224939,1224941,1224944,1224946,1224947,1224949,1224951,1224988,1224992,1224998,1225000,1225001,1225004,1225006,1225008,1225009,1225014,1225015,1225022,1225025,1225028,1225029,1225031,1225036,1225041,1225044,1225049,1225050,1225076,1225077,1225078,1225081,1225085,1225086,1225090,1225092,1225096,1225097,1225098,1225101,1225103,1225104,1225105,1225106,1225108,1225120,1225132,1225180,1225300,1225391,1225472,1225475,1225476,1225477,1225478,1225485,1225490,1225527,1225529,1225530,1225532,1225534,1225548,1225550,1225553,1225554,1225555,1225556,1225557,1225559,1225560,1225564,1225565,1225566,1225568,1225569,1225570,1225571,1225572,1225573,1225577,1225581,1225583,1225584,1225585,1225586,1225587,1225588,1225589,1225590,1225591,1225592,1225594,1225595,1225599,1225602,1225605,1225609,1225611,1225681,1225702,1225723,1225726,1225731,1225732,1225737,1225741,1225758,1225759,1225760,1225761,1225762,1225763,1225767,1225770,1225815,1225820,1225823,1225827,1225834,1225866,1225872,1225898,1225903,1226022,1226131,1226145,1226149,1226155,1226158,1226163,1226211,1226212,1226226,1226457,1226503,1226513,1226514,1226520,1226582,1226587,1226588,1226592,1226593,1226594,1226595,1226597,1226607,1226608,1226610,1226612,1226613,1226630,1226632,1226633,1226634,1226637,1226657,1226658,1226734,1226735,1226737,1226738,1226739,1226740,1226741,1226742,1226744,1226746,1226747,1226749,1226754,1226758,1226760,1226761,1226764,1226767,1226768,1226769,1226771,1226772,1226774,1226775,1226776,1226777,1226780,1226781,1226786,1226788,1226789,1226790,1226791,1226796,1226799,1226837,1226839,1226840,1226841,1226842,1226844,1226848,1226852,1226856,1226857,1226859,1226861,1226863,1226864,1226867,1226868,1226875,1226876,1226878,1226879,1226886,1226890,1226891,1226894,1226895,1226905,1226908,1226909,1226911,1226928,1226934,1226938,1226939,1226941,1226948,1226949,1226950,1226962,1226976,1226989,1226990,1226992,1226994,1226995,1226996,1227066,1227072,1227085,1227089,1227090,1227096,1227101,1227190,CVE-2021-47432,CVE-2022-48772,CVE-2023-52622,CVE-2023-52656,CVE-2023-52672,CVE-2023-52699,CVE-2023-52735,CVE-2023-52749,CVE-2023-52750,CVE-2023-52753,CVE-2023-52754,CVE-2023-52757,CVE-2023-52759,CVE-2023-52762,CVE-2023-52763,CVE-2023-52764,CVE-2023-52765,CVE-2023-52766,CVE-2023-52767,CVE-2023-52768,CVE-2023-52769,CVE-2023-52773,CVE-2023-52774,CVE-2023-52776,CVE-2023-52777,CVE-2023-52780,CVE-2023-52781,CVE-2023-52782,CVE-2023-52783,CVE-2023-52784,CVE-2023-52786,CVE-2023-52787,CVE-2023-52788,CVE-2023-52789,CVE-2023-52791,CVE-2023-52792,CVE-2023-52794,CVE-2023-52795,CVE-2023-52796,CVE-2023-52798,CVE-2023-52799,CVE-2023-52800,CVE-2023-52801,CVE-2023-52803,CVE-2023-52804,CVE-2023-52805,CVE-2023-52806,CVE-2023-52807,CVE-2023-52808,CVE-2023-52809,CVE-2023-52810,CVE-2023-52811,CVE-2023-52812,CVE-2023-52813,CVE-2023-52814,CVE-2023-52815,CVE-2023-52816,CVE-2023-52817,CVE-2023-52818,CVE-2023-52819,CVE-2023-52821,CVE-2023-52825,CVE-2023-52826,CVE-2023-52827,CVE-2023-52829,CVE-2023-52832,CVE-2023-52833,CVE-2023-52834,CVE-2023-52835,CVE-2023-52836,CVE-2023-52837,CVE-2023-52838,CVE-2023-52840,CVE-2023-52841,CVE-2023-52842,CVE-2023-52843,CVE-2023-52844,CVE-2023-52845,CVE-2023-52846,CVE-2023-52847,CVE-2023-52849,CVE-2023-52850,CVE-2023-52851,CVE-2023-52853,CVE-2023-52854,CVE-2023-52855,CVE-2023-52856,CVE-2023-52857,CVE-2023-52858,CVE-2023-52861,CVE-2023-52862,CVE-2023-52863,CVE-2023-52864,CVE-2023-52865,CVE-2023-52866,CVE-2023-52867,CVE-2023-52868,CVE-2023-52869,CVE-2023-52870,CVE-2023-52871,CVE-2023-52872,CVE-2023-52873,CVE-2023-52874,CVE-2023-52875,CVE-2023-52876,CVE-2023-52877,CVE-2023-52878,CVE-2023-52879,CVE-2023-52880,CVE-2023-52881,CVE-2023-52883,CVE-2023-52884,CVE-2024-26482,CVE-2024-26625,CVE-2024-26676,CVE-2024-26750,CVE-2024-26758,CVE-2024-26767,CVE-2024-26780,CVE-2024-26813,CVE-2024-26814,CVE-2024-26845,CVE-2024-26889,CVE-2024-26920,CVE-2024-27414,CVE-2024-27419,CVE-2024-33619,CVE-2024-34777,CVE-2024-35247,CVE-2024-35807,CVE-2024-35827,CVE-2024-35831,CVE-2024-35843,CVE-2024-35848,CVE-2024-35857,CVE-2024-35880,CVE-2024-35884,CVE-2024-35886,CVE-2024-35892,CVE-2024-35896,CVE-2024-35898,CVE-2024-35900,CVE-2024-35925,CVE-2024-35926,CVE-2024-35957,CVE-2024-35962,CVE-2024-35970,CVE-2024-35976,CVE-2024-35979,CVE-2024-35998,CVE-2024-36005,CVE-2024-36008,CVE-2024-36010,CVE-2024-36017,CVE-2024-36024,CVE-2024-36281,CVE-2024-36477,CVE-2024-36478,CVE-2024-36479,CVE-2024-36882,CVE-2024-36887,CVE-2024-36899,CVE-2024-36900,CVE-2024-36903,CVE-2024-36904,CVE-2024-36915,CVE-2024-36916,CVE-2024-36917,CVE-2024-36919,CVE-2024-36923,CVE-2024-36924,CVE-2024-36926,CVE-2024-36934,CVE-2024-36935,CVE-2024-36937,CVE-2024-36938,CVE-2024-36945,CVE-2024-36952,CVE-2024-36957,CVE-2024-36960,CVE-2024-36962,CVE-2024-36964,CVE-2024-36965,CVE-2024-36967,CVE-2024-36969,CVE-2024-36971,CVE-2024-36972,CVE-2024-36973,CVE-2024-36975,CVE-2024-36977,CVE-2024-36978,CVE-2024-37021,CVE-2024-37078,CVE-2024-37353,CVE-2024-37354,CVE-2024-38381,CVE-2024-38384,CVE-2024-38385,CVE-2024-38388,CVE-2024-38390,CVE-2024-38391,CVE-2024-38539,CVE-2024-38540,CVE-2024-38541,CVE-2024-38543,CVE-2024-38544,CVE-2024-38545,CVE-2024-38546,CVE-2024-38547,CVE-2024-38548,CVE-2024-38549,CVE-2024-38550,CVE-2024-38551,CVE-2024-38552,CVE-2024-38553,CVE-2024-38554,CVE-2024-38555,CVE-2024-38556,CVE-2024-38557,CVE-2024-38559,CVE-2024-38560,CVE-2024-38562,CVE-2024-38564,CVE-2024-38565,CVE-2024-38566,CVE-2024-38567,CVE-2024-38568,CVE-2024-38569,CVE-2024-38570,CVE-2024-38571,CVE-2024-38572,CVE-2024-38573,CVE-2024-38575,CVE-2024-38578,CVE-2024-38579,CVE-2024-38580,CVE-2024-38581,CVE-2024-38582,CVE-2024-38583,CVE-2024-38587,CVE-2024-38588,CVE-2024-38590,CVE-2024-38591,CVE-2024-38592,CVE-2024-38594,CVE-2024-38595,CVE-2024-38597,CVE-2024-38599,CVE-2024-38600,CVE-2024-38601,CVE-2024-38602,CVE-2024-38603,CVE-2024-38605,CVE-2024-38608,CVE-2024-38610,CVE-2024-38611,CVE-2024-38615,CVE-2024-38616,CVE-2024-38617,CVE-2024-38618,CVE-2024-38619,CVE-2024-38621,CVE-2024-38622,CVE-2024-38627,CVE-2024-38628,CVE-2024-38629,CVE-2024-38630,CVE-2024-38633,CVE-2024-38634,CVE-2024-38635,CVE-2024-38636,CVE-2024-38661,CVE-2024-38663,CVE-2024-38664,CVE-2024-38780,CVE-2024-39277,CVE-2024-39291,CVE-2024-39296,CVE-2024-39301,CVE-2024-39362,CVE-2024-39371,CVE-2024-39463,CVE-2024-39466,CVE-2024-39469,CVE-2024-39471
Description:

The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:


The following non-security bugs were fixed:


SUSE-CU-2024:3186-1

Container Advisory IDSUSE-CU-2024:3186-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.17.14 , bci/bci-sle15-kernel-module-devel:latest
Container Release17.14
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2479-1
ReleasedMon Jul 15 10:33:22 2024
SummarySecurity update for python3
Typesecurity
Severityimportant
References1219559,1220664,1221563,1221854,1222075,1226447,1226448,CVE-2023-52425,CVE-2024-0397,CVE-2024-0450,CVE-2024-4032
Description:

This update for python3 fixes the following issues:


SUSE-CU-2024:3147-1

Container Advisory IDSUSE-CU-2024:3147-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.17.13 , bci/bci-sle15-kernel-module-devel:latest
Container Release17.13
The following patches have been included in this update:

SUSE-CU-2024:3088-1

Container Advisory IDSUSE-CU-2024:3088-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.17.11 , bci/bci-sle15-kernel-module-devel:latest
Container Release17.11
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2307-1
ReleasedFri Jul 5 12:04:34 2024
SummarySecurity update for krb5
Typesecurity
Severityimportant
References1227186,1227187,CVE-2024-37370,CVE-2024-37371
Description:

This update for krb5 fixes the following issues:


SUSE-CU-2024:3040-1

Container Advisory IDSUSE-CU-2024:3040-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.17.9 , bci/bci-sle15-kernel-module-devel:latest
Container Release17.9
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2290-1
ReleasedWed Jul 3 11:35:00 2024
SummarySecurity update for libxml2
Typesecurity
Severitylow
References1224282,CVE-2024-34459
Description:

This update for libxml2 fixes the following issues:


SUSE-CU-2024:2992-1

Container Advisory IDSUSE-CU-2024:2992-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.17.7 , bci/bci-sle15-kernel-module-devel:latest
Container Release17.7
The following patches have been included in this update:

SUSE-CU-2024:2973-1

Container Advisory IDSUSE-CU-2024:2973-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.17.6 , bci/bci-sle15-kernel-module-devel:latest
Container Release17.6
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2086-1
ReleasedWed Jun 19 11:48:24 2024
SummaryRecommended update for gcc13
Typerecommended
Severitymoderate
References1188441
Description:

This update for gcc13 fixes the following issues:
Update to GCC 13.3 release


Advisory IDSUSE-SU-2024:2203-1
ReleasedTue Jun 25 15:04:37 2024
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1012628,1065729,1181674,1187716,1193599,1194869,1207948,1208593,1209657,1213573,1214852,1215199,1216196,1216358,1216702,1217169,1217384,1217408,1217489,1217750,1217959,1218205,1218336,1218447,1218779,1218917,1219104,1219170,1219596,1219623,1219834,1220021,1220045,1220120,1220148,1220328,1220342,1220428,1220430,1220569,1220587,1220783,1220915,1221044,1221293,1221303,1221504,1221612,1221615,1221635,1221645,1221649,1221765,1221777,1221783,1221816,1221829,1221830,1221858,1222048,1222173,1222264,1222273,1222294,1222301,1222303,1222304,1222307,1222357,1222366,1222368,1222371,1222378,1222385,1222422,1222426,1222428,1222437,1222445,1222459,1222464,1222489,1222522,1222525,1222532,1222557,1222559,1222563,1222585,1222596,1222606,1222608,1222613,1222615,1222618,1222622,1222624,1222627,1222630,1222635,1222721,1222727,1222769,1222771,1222775,1222777,1222780,1222782,1222793,1222799,1222801,1222968,1223007,1223011,1223015,1223020,1223023,1223024,1223033,1223034,1223035,1223038,1223039,1223041,1223045,1223046,1223051,1223052,1223058,1223060,1223061,1223076,1223077,1223111,1223113,1223138,1223143,1223187,1223189,1223190,1223191,1223198,1223202,1223285,1223315,1223338,1223369,1223380,1223384,1223390,1223439,1223462,1223532,1223539,1223575,1223590,1223591,1223592,1223593,1223625,1223629,1223633,1223634,1223637,1223641,1223643,1223649,1223650,1223651,1223652,1223653,1223654,1223655,1223660,1223661,1223664,1223665,1223666,1223668,1223669,1223670,1223671,1223675,1223677,1223678,1223686,1223692,1223693,1223695,1223696,1223698,1223705,1223712,1223718,1223728,1223732,1223735,1223739,1223741,1223744,1223745,1223747,1223748,1223749,1223750,1223752,1223754,1223757,1223759,1223761,1223762,1223774,1223782,1223787,1223788,1223789,1223790,1223802,1223805,1223810,1223822,1223827,1223831,1223834,1223838,1223869,1223870,1223871,1223872,1223874,1223944,1223945,1223946,1223991,1224076,1224096,1224098,1224099,1224137,1224166,1224174,1224177,1224180,1224181,1224331,1224423,1224429,1224430,1224432,1224433,1224437,1224438,1224442,1224443,1224445,1224449,1224477,1224479,1224480,1224481,1224482,1224486,1224487,1224488,1224491,1224492,1224493,1224494,1224495,1224500,1224501,1224502,1224504,1224505,1224506,1224507,1224508,1224509,1224511,1224513,1224517,1224519,1224521,1224524,1224525,1224526,1224530,1224531,1224534,1224537,1224541,1224542,1224543,1224546,1224550,1224552,1224553,1224555,1224557,1224558,1224559,1224562,1224565,1224566,1224567,1224568,1224569,1224571,1224573,1224576,1224577,1224578,1224579,1224580,1224581,1224582,1224585,1224586,1224587,1224588,1224592,1224596,1224598,1224600,1224601,1224602,1224603,1224605,1224607,1224608,1224609,1224611,1224613,1224615,1224617,1224618,1224620,1224621,1224622,1224623,1224624,1224626,1224627,1224628,1224629,1224630,1224632,1224633,1224634,1224636,1224637,1224638,1224639,1224640,1224643,1224644,1224645,1224646,1224647,1224648,1224649,1224650,1224651,1224652,1224653,1224654,1224657,1224660,1224663,1224664,1224665,1224666,1224667,1224668,1224671,1224672,1224674,1224675,1224676,1224677,1224678,1224679,1224680,1224681,1224682,1224683,1224685,1224686,1224687,1224688,1224692,1224696,1224697,1224699,1224701,1224703,1224704,1224705,1224706,1224707,1224709,1224710,1224712,1224714,1224716,1224717,1224718,1224719,1224720,1224721,1224722,1224723,1224725,1224727,1224728,1224729,1224730,1224731,1224732,1224733,1224736,1224738,1224739,1224740,1224741,1224742,1224747,1224749,1224763,1224764,1224765,1224766,1224790,1224792,1224793,1224803,1224804,1224866,1224936,1224989,1225007,1225053,1225133,1225134,1225136,1225172,1225502,1225578,1225579,1225580,1225593,1225605,1225607,1225610,1225616,1225618,1225640,1225642,1225692,1225694,1225695,1225696,1225698,1225699,1225704,1225705,1225708,1225710,1225712,1225714,1225715,1225720,1225722,1225728,1225734,1225735,1225736,1225747,1225748,1225749,1225750,1225756,1225765,1225766,1225769,1225773,1225775,1225842,1225945,1226158,CVE-2023-0160,CVE-2023-52434,CVE-2023-52458,CVE-2023-52472,CVE-2023-52503,CVE-2023-52616,CVE-2023-52618,CVE-2023-52631,CVE-2023-52635,CVE-2023-52640,CVE-2023-52641,CVE-2023-52645,CVE-2023-52652,CVE-2023-52653,CVE-2023-52654,CVE-2023-52655,CVE-2023-52657,CVE-2023-52658,CVE-2023-52659,CVE-2023-52660,CVE-2023-52661,CVE-2023-52662,CVE-2023-52663,CVE-2023-52664,CVE-2023-52667,CVE-2023-52669,CVE-2023-52670,CVE-2023-52671,CVE-2023-52673,CVE-2023-52674,CVE-2023-52675,CVE-2023-52676,CVE-2023-52678,CVE-2023-52679,CVE-2023-52680,CVE-2023-52681,CVE-2023-52683,CVE-2023-52685,CVE-2023-52686,CVE-2023-52687,CVE-2023-52690,CVE-2023-52691,CVE-2023-52692,CVE-2023-52693,CVE-2023-52694,CVE-2023-52695,CVE-2023-52696,CVE-2023-52697,CVE-2023-52698,CVE-2023-52771,CVE-2023-52772,CVE-2023-52860,CVE-2023-52882,CVE-2023-6238,CVE-2023-7042,CVE-2024-0639,CVE-2024-21823,CVE-2024-22099,CVE-2024-23848,CVE-2024-24861,CVE-2024-25739,CVE-2024-26601,CVE-2024-26611,CVE-2024-26614,CVE-2024-26632,CVE-2024-26638,CVE-2024-26642,CVE-2024-26643,CVE-2024-26650,CVE-2024-26654,CVE-2024-26656,CVE-2024-26657,CVE-2024-26671,CVE-2024-26673,CVE-2024-26674,CVE-2024-26679,CVE-2024-26684,CVE-2024-26685,CVE-2024-26692,CVE-2024-26704,CVE-2024-26714,CVE-2024-26726,CVE-2024-26731,CVE-2024-26733,CVE-2024-26737,CVE-2024-26739,CVE-2024-26740,CVE-2024-26742,CVE-2024-26760,CVE-2024-267600,CVE-2024-26761,CVE-2024-26764,CVE-2024-26769,CVE-2024-26772,CVE-2024-26773,CVE-2024-26774,CVE-2024-26775,CVE-2024-26783,CVE-2024-26786,CVE-2024-26791,CVE-2024-26793,CVE-2024-26794,CVE-2024-26802,CVE-2024-26805,CVE-2024-26807,CVE-2024-26815,CVE-2024-26816,CVE-2024-26822,CVE-2024-26832,CVE-2024-26836,CVE-2024-26844,CVE-2024-26846,CVE-2024-26853,CVE-2024-26854,CVE-2024-26855,CVE-2024-26856,CVE-2024-26857,CVE-2024-26858,CVE-2024-26860,CVE-2024-26861,CVE-2024-26862,CVE-2024-26866,CVE-2024-26868,CVE-2024-26870,CVE-2024-26878,CVE-2024-26881,CVE-2024-26882,CVE-2024-26883,CVE-2024-26884,CVE-2024-26885,CVE-2024-26899,CVE-2024-26900,CVE-2024-26901,CVE-2024-26903,CVE-2024-26906,CVE-2024-26909,CVE-2024-26921,CVE-2024-26922,CVE-2024-26923,CVE-2024-26925,CVE-2024-26928,CVE-2024-26932,CVE-2024-26933,CVE-2024-26934,CVE-2024-26935,CVE-2024-26937,CVE-2024-26938,CVE-2024-26940,CVE-2024-26943,CVE-2024-26945,CVE-2024-26946,CVE-2024-26948,CVE-2024-26949,CVE-2024-26950,CVE-2024-26951,CVE-2024-26957,CVE-2024-26958,CVE-2024-26960,CVE-2024-26961,CVE-2024-26962,CVE-2024-26963,CVE-2024-26964,CVE-2024-26972,CVE-2024-26973,CVE-2024-26978,CVE-2024-26981,CVE-2024-26982,CVE-2024-26983,CVE-2024-26984,CVE-2024-26986,CVE-2024-26988,CVE-2024-26989,CVE-2024-26990,CVE-2024-26991,CVE-2024-26992,CVE-2024-26993,CVE-2024-26994,CVE-2024-26995,CVE-2024-26996,CVE-2024-26997,CVE-2024-26999,CVE-2024-27000,CVE-2024-27001,CVE-2024-27002,CVE-2024-27003,CVE-2024-27004,CVE-2024-27008,CVE-2024-27013,CVE-2024-27014,CVE-2024-27022,CVE-2024-27027,CVE-2024-27028,CVE-2024-27029,CVE-2024-27030,CVE-2024-27031,CVE-2024-27036,CVE-2024-27046,CVE-2024-27056,CVE-2024-27057,CVE-2024-27062,CVE-2024-27067,CVE-2024-27080,CVE-2024-27388,CVE-2024-27389,CVE-2024-27393,CVE-2024-27395,CVE-2024-27396,CVE-2024-27398,CVE-2024-27399,CVE-2024-27400,CVE-2024-27401,CVE-2024-27405,CVE-2024-27408,CVE-2024-27410,CVE-2024-27411,CVE-2024-27412,CVE-2024-27413,CVE-2024-27416,CVE-2024-27417,CVE-2024-27418,CVE-2024-27431,CVE-2024-27432,CVE-2024-27434,CVE-2024-27435,CVE-2024-27436,CVE-2024-35784,CVE-2024-35786,CVE-2024-35788,CVE-2024-35789,CVE-2024-35790,CVE-2024-35791,CVE-2024-35794,CVE-2024-35795,CVE-2024-35796,CVE-2024-35799,CVE-2024-35800,CVE-2024-35801,CVE-2024-35803,CVE-2024-35804,CVE-2024-35806,CVE-2024-35808,CVE-2024-35809,CVE-2024-35810,CVE-2024-35811,CVE-2024-35812,CVE-2024-35813,CVE-2024-35814,CVE-2024-35815,CVE-2024-35817,CVE-2024-35819,CVE-2024-35821,CVE-2024-35822,CVE-2024-35823,CVE-2024-35824,CVE-2024-35825,CVE-2024-35828,CVE-2024-35829,CVE-2024-35830,CVE-2024-35833,CVE-2024-35834,CVE-2024-35835,CVE-2024-35836,CVE-2024-35837,CVE-2024-35838,CVE-2024-35841,CVE-2024-35842,CVE-2024-35845,CVE-2024-35847,CVE-2024-35849,CVE-2024-35850,CVE-2024-35851,CVE-2024-35852,CVE-2024-35854,CVE-2024-35860,CVE-2024-35861,CVE-2024-35862,CVE-2024-35863,CVE-2024-35864,CVE-2024-35865,CVE-2024-35866,CVE-2024-35867,CVE-2024-35868,CVE-2024-35869,CVE-2024-35870,CVE-2024-35872,CVE-2024-35875,CVE-2024-35877,CVE-2024-35878,CVE-2024-35879,CVE-2024-35883,CVE-2024-35885,CVE-2024-35887,CVE-2024-35889,CVE-2024-35891,CVE-2024-35895,CVE-2024-35901,CVE-2024-35903,CVE-2024-35904,CVE-2024-35905,CVE-2024-35907,CVE-2024-35909,CVE-2024-35911,CVE-2024-35912,CVE-2024-35914,CVE-2024-35915,CVE-2024-35916,CVE-2024-35917,CVE-2024-35921,CVE-2024-35922,CVE-2024-35924,CVE-2024-35927,CVE-2024-35928,CVE-2024-35930,CVE-2024-35931,CVE-2024-35932,CVE-2024-35933,CVE-2024-35935,CVE-2024-35936,CVE-2024-35937,CVE-2024-35938,CVE-2024-35940,CVE-2024-35943,CVE-2024-35944,CVE-2024-35945,CVE-2024-35946,CVE-2024-35947,CVE-2024-35950,CVE-2024-35951,CVE-2024-35952,CVE-2024-35953,CVE-2024-35954,CVE-2024-35955,CVE-2024-35956,CVE-2024-35958,CVE-2024-35959,CVE-2024-35960,CVE-2024-35961,CVE-2024-35963,CVE-2024-35964,CVE-2024-35965,CVE-2024-35966,CVE-2024-35967,CVE-2024-35969,CVE-2024-35971,CVE-2024-35972,CVE-2024-35973,CVE-2024-35974,CVE-2024-35975,CVE-2024-35977,CVE-2024-35978,CVE-2024-35981,CVE-2024-35982,CVE-2024-35984,CVE-2024-35986,CVE-2024-35989,CVE-2024-35990,CVE-2024-35991,CVE-2024-35992,CVE-2024-35995,CVE-2024-35997,CVE-2024-35999,CVE-2024-36002,CVE-2024-36006,CVE-2024-36007,CVE-2024-36009,CVE-2024-36011,CVE-2024-36012,CVE-2024-36013,CVE-2024-36014,CVE-2024-36015,CVE-2024-36016,CVE-2024-36018,CVE-2024-36019,CVE-2024-36020,CVE-2024-36021,CVE-2024-36025,CVE-2024-36026,CVE-2024-36029,CVE-2024-36030,CVE-2024-36032,CVE-2024-36880,CVE-2024-36885,CVE-2024-36890,CVE-2024-36891,CVE-2024-36893,CVE-2024-36894,CVE-2024-36895,CVE-2024-36896,CVE-2024-36897,CVE-2024-36898,CVE-2024-36906,CVE-2024-36918,CVE-2024-36921,CVE-2024-36922,CVE-2024-36928,CVE-2024-36930,CVE-2024-36931,CVE-2024-36936,CVE-2024-36940,CVE-2024-36941,CVE-2024-36942,CVE-2024-36944,CVE-2024-36947,CVE-2024-36949,CVE-2024-36950,CVE-2024-36951,CVE-2024-36955,CVE-2024-36959
Description:



The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:


The following non-security bugs were fixed:


Advisory IDSUSE-RU-2024:2214-1
ReleasedTue Jun 25 17:11:26 2024
SummaryRecommended update for util-linux
Typerecommended
Severitymoderate
References1225598
Description:

This update for util-linux fixes the following issue:


Advisory IDSUSE-RU-2024:2234-1
ReleasedWed Jun 26 12:54:27 2024
SummaryRecommended update for suse-module-tools
Typerecommended
Severitymoderate
References1224400
Description:

This update for suse-module-tools fixes the following issue:


Advisory IDSUSE-RU-2024:2264-1
ReleasedTue Jul 2 10:14:25 2024
SummaryRecommended update for python-rpm-macros
Typerecommended
Severitymoderate
References
Description:

This update for python-rpm-macros fixes the following issues:


* Fix python_clone sed regex

* Make sure that RPM_BUILD_ROOT env is set * don't eliminate any cmdline arguments in the shebang line * Create python313 macros

* Fix typo 310 -> 312 in default-prjconf

* SPEC0: Drop python39, add python312 to buildset (#169)

* fix python2_compile macro

* make FLAVOR_compile compatible with python2

* Combine fix_shebang in one line * New macro FLAVOR_fix_shebang_path * Use realpath in %python_clone macro shebang replacement * Compile and fix_shebang in %python_install macros

* Revert 'Compile and fix_shebang in %python_install macros'

* Compile and fix_shebang in %python_install macros

* Fix shebang also in sbin with macro _fix_shebang

* move compile loop to python * remove python38


SUSE-CU-2024:2803-1

Container Advisory IDSUSE-CU-2024:2803-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.15.7
Container Release15.7
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2059-1
ReleasedTue Jun 18 13:11:29 2024
SummarySecurity update for openssl-1_1
Typesecurity
Severityimportant
References1225551,CVE-2024-4741
Description:

This update for openssl-1_1 fixes the following issues:


Advisory IDSUSE-SU-2024:2066-1
ReleasedTue Jun 18 13:16:09 2024
SummarySecurity update for openssl-3
Typesecurity
Severityimportant
References1223428,1224388,1225291,1225551,CVE-2024-4603,CVE-2024-4741
Description:

This update for openssl-3 fixes the following issues:
Security issues fixed:


Other issues fixed:


SUSE-CU-2024:2721-1

Container Advisory IDSUSE-CU-2024:2721-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.15.5
Container Release15.5
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2024-1
ReleasedThu Jun 13 16:15:18 2024
SummaryRecommended update for jitterentropy
Typerecommended
Severitymoderate
References1209627
Description:

This update for jitterentropy fixes the following issues:


Updated to 3.4.1


SUSE-CU-2024:2683-1

Container Advisory IDSUSE-CU-2024:2683-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.15.4
Container Release15.4
The following patches have been included in this update:

SUSE-CU-2024:2620-1

Container Advisory IDSUSE-CU-2024:2620-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.14.4
Container Release14.4
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:1997-1
ReleasedTue Jun 11 17:24:32 2024
SummaryRecommended update for e2fsprogs
Typerecommended
Severitymoderate
References1223596
Description:

This update for e2fsprogs fixes the following issues:


SUSE-CU-2024:2601-1

Container Advisory IDSUSE-CU-2024:2601-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.13.5
Container Release13.5
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:1943-1
ReleasedFri Jun 7 17:04:06 2024
SummarySecurity update for util-linux
Typesecurity
Severityimportant
References1218609,1220117,1221831,1223605,CVE-2024-28085
Description:

This update for util-linux fixes the following issues:


Advisory IDSUSE-RU-2024:1951-1
ReleasedFri Jun 7 17:27:16 2024
SummaryRecommended update for libbpf
Typerecommended
Severitymoderate
References1221101
Description:

This update for libbpf fixes the following issues:


Advisory IDSUSE-RU-2024:1954-1
ReleasedFri Jun 7 18:01:06 2024
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1221482
Description:

This update for glibc fixes the following issues:


SUSE-CU-2024:2557-1

Container Advisory IDSUSE-CU-2024:2557-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.13.1
Container Release13.1
The following patches have been included in this update:

SUSE-CU-2024:2539-1

Container Advisory IDSUSE-CU-2024:2539-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.12.1
Container Release12.1
The following patches have been included in this update:

SUSE-CU-2024:2499-1

Container Advisory IDSUSE-CU-2024:2499-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.11.1
Container Release11.1
The following patches have been included in this update:

SUSE-CU-2024:2489-1

Container Advisory IDSUSE-CU-2024:2489-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.10.14
Container Release10.14
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:1557-1
ReleasedWed May 8 11:42:34 2024
SummarySecurity update for rpm
Typesecurity
Severitymoderate
References1189495,1191175,1218686,CVE-2021-3521
Description:

This update for rpm fixes the following issues:
Security fixes:


Other fixes:


Advisory IDSUSE-RU-2024:1665-1
ReleasedThu May 16 08:00:09 2024
SummaryRecommended update for coreutils
Typerecommended
Severitymoderate
References1221632
Description:

This update for coreutils fixes the following issues:


Advisory IDSUSE-SU-2024:1762-1
ReleasedWed May 22 16:14:17 2024
SummarySecurity update for perl
Typesecurity
Severityimportant
References1082216,1082233,1213638,CVE-2018-6798,CVE-2018-6913
Description:

This update for perl fixes the following issues:
Security issues fixed:


Non-security issue fixed:


Advisory IDSUSE-RU-2024:1851-1
ReleasedThu May 30 13:53:44 2024
SummaryRecommended update for dwz
Typerecommended
Severitylow
References1221634
Description:

This update for dwz fixes the following issues:


Advisory IDSUSE-RU-2024:1887-1
ReleasedFri May 31 19:08:38 2024
SummaryRecommended update for suse-module-tools
Typerecommended
Severitymoderate
References1192014,1216717,1217979,1223278,1224320
Description:

This update for suse-module-tools fixes the following issues:


SUSE-CU-2024:2178-1

Container Advisory IDSUSE-CU-2024:2178-1
Container Tagsbci/bci-sle15-kernel-module-devel:15.6 , bci/bci-sle15-kernel-module-devel:15.6.10.11
Container Release10.11
The following patches have been included in this update:
Advisory IDSUSE-RU-2018:2569-1
ReleasedFri Nov 2 19:00:18 2018
SummaryRecommended update for pam
Typerecommended
Severitymoderate
References1110700
Description:

This update for pam fixes the following issues:


Advisory IDSUSE-RU-2018:2607-1
ReleasedWed Nov 7 15:42:48 2018
SummaryOptional update for gcc8
Typerecommended
Severitylow
References1084812,1084842,1087550,1094222,1102564
Description:


The GNU Compiler GCC 8 is being added to the Development Tools Module by this update.
The update also supplies gcc8 compatible libstdc++, libgcc_s1 and other gcc derived libraries for the Basesystem module of SUSE Linux Enterprise 15.
Various optimizers have been improved in GCC 8, several of bugs fixed, quite some new warnings added and the error pin-pointing and fix-suggestions have been greatly improved.
The GNU Compiler page for GCC 8 contains a summary of all the changes that have happened:
https://gcc.gnu.org/gcc-8/changes.html
Also changes needed or common pitfalls when porting software are described on:
https://gcc.gnu.org/gcc-8/porting_to.html


Advisory IDSUSE-RU-2018:2798-1
ReleasedWed Nov 28 07:48:35 2018
SummaryRecommended update for make
Typerecommended
Severitymoderate
References1100504
Description:

This update for make fixes the following issues:


Advisory IDSUSE-SU-2018:2825-1
ReleasedMon Dec 3 15:35:02 2018
SummarySecurity update for pam
Typesecurity
Severityimportant
References1115640,CVE-2018-17953
Description:

This update for pam fixes the following issue:
Security issue fixed:


Advisory IDSUSE-SU-2018:2861-1
ReleasedThu Dec 6 14:32:01 2018
SummarySecurity update for ncurses
Typesecurity
Severityimportant
References1103320,1115929,CVE-2018-19211
Description:

This update for ncurses fixes the following issues:
Security issue fixed:


Non-security issue fixed:


Advisory IDSUSE-SU-2018:3044-1
ReleasedFri Dec 21 18:47:21 2018
SummarySecurity update for MozillaFirefox, mozilla-nspr and mozilla-nss
Typesecurity
Severityimportant
References1097410,1106873,1119069,1119105,CVE-2018-0495,CVE-2018-12384,CVE-2018-12404,CVE-2018-12405,CVE-2018-17466,CVE-2018-18492,CVE-2018-18493,CVE-2018-18494,CVE-2018-18498
Description:

This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:
Issues fixed in MozillaFirefox:


Issues fixed in mozilla-nss:

Issues fixed in mozilla-nspr:


Advisory IDSUSE-RU-2019:6-1
ReleasedWed Jan 2 20:25:25 2019
SummaryRecommended update for gcc7
Typerecommended
Severitymoderate
References1099119,1099192
Description:



GCC 7 was updated to the GCC 7.4 release.


Advisory IDSUSE-RU-2019:44-1
ReleasedTue Jan 8 13:07:32 2019
SummaryRecommended update for acl
Typerecommended
Severitylow
References953659
Description:

This update for acl fixes the following issues:


Advisory IDSUSE-SU-2019:247-1
ReleasedWed Feb 6 07:18:45 2019
SummarySecurity update for lua53
Typesecurity
Severitymoderate
References1123043,CVE-2019-6706
Description:

This update for lua53 fixes the following issues:
Security issue fixed:


Advisory IDSUSE-SU-2019:571-1
ReleasedThu Mar 7 18:13:46 2019
SummarySecurity update for file
Typesecurity
Severitymoderate
References1096974,1096984,1126117,1126118,1126119,CVE-2018-10360,CVE-2019-8905,CVE-2019-8906,CVE-2019-8907
Description:

This update for file fixes the following issues:
The following security vulnerabilities were addressed:


Advisory IDSUSE-SU-2019:788-1
ReleasedThu Mar 28 11:55:06 2019
SummarySecurity update for sqlite3
Typesecurity
Severitymoderate
References1119687,CVE-2018-20346
Description:

This update for sqlite3 to version 3.27.2 fixes the following issue:
Security issue fixed:


Release notes: https://www.sqlite.org/releaselog/3_27_2.html


Advisory IDSUSE-RU-2019:905-1
ReleasedMon Apr 8 16:48:02 2019
SummaryRecommended update for gcc
Typerecommended
Severitymoderate
References1096008
Description:

This update for gcc fixes the following issues:


Advisory IDSUSE-SU-2019:926-1
ReleasedWed Apr 10 16:33:12 2019
SummarySecurity update for tar
Typesecurity
Severitymoderate
References1120610,1130496,CVE-2018-20482,CVE-2019-9923
Description:

This update for tar fixes the following issues:
Security issues fixed:


Advisory IDSUSE-RU-2019:1105-1
ReleasedTue Apr 30 12:10:58 2019
SummaryRecommended update for gcc7
Typerecommended
Severitymoderate
References1084842,1114592,1124644,1128794,1129389,1131264,SLE-6738
Description:

This update for gcc7 fixes the following issues:
Update to gcc-7-branch head (r270528).


Advisory IDSUSE-SU-2019:1127-1
ReleasedThu May 2 09:39:24 2019
SummarySecurity update for sqlite3
Typesecurity
Severitymoderate
References1130325,1130326,CVE-2019-9936,CVE-2019-9937
Description:

This update for sqlite3 to version 3.28.0 fixes the following issues:
Security issues fixed:


Advisory IDSUSE-SU-2019:1368-1
ReleasedTue May 28 13:15:38 2019
SummaryRecommended update for sles12sp3-docker-image, sles12sp4-image, system-user-root
Typesecurity
Severityimportant
References1134524,CVE-2019-5021
Description:

This update for sles12sp3-docker-image, sles12sp4-image, system-user-root fixes the following issues:


Advisory IDSUSE-RU-2019:1393-1
ReleasedFri May 31 10:18:34 2019
SummaryRecommended update for pesign
Typerecommended
Severitymoderate
References1130588,1134670
Description:

This update for pesign fixes the following issues:



Advisory IDSUSE-RU-2019:2142-1
ReleasedWed Aug 14 18:14:04 2019
SummaryRecommended update for mozilla-nspr, mozilla-nss
Typerecommended
Severitymoderate
References1141322
Description:


This update for mozilla-nspr, mozilla-nss fixes the following issues:
mozilla-nss was updated to NSS 3.45 (bsc#1141322) :


mozilla-nspr was updated to version 4.21


Advisory IDSUSE-RU-2019:2323-1
ReleasedFri Sep 6 09:19:52 2019
SummaryRecommended update for pesign
Typerecommended
Severitymoderate
References1144441
Description:

This update for pesign contains the following fixes:


Advisory IDSUSE-SU-2019:2533-1
ReleasedThu Oct 3 15:02:50 2019
SummarySecurity update for sqlite3
Typesecurity
Severitymoderate
References1150137,CVE-2019-16168
Description:

This update for sqlite3 fixes the following issues:
Security issue fixed:


Advisory IDSUSE-SU-2019:2702-1
ReleasedWed Oct 16 18:41:30 2019
SummarySecurity update for gcc7
Typesecurity
Severitymoderate
References1071995,1141897,1142649,1148517,1149145,CVE-2019-14250,CVE-2019-15847
Description:

This update for gcc7 to r275405 fixes the following issues:
Security issues fixed:


Non-security issue fixed:


Advisory IDSUSE-SU-2019:2779-1
ReleasedThu Oct 24 16:57:42 2019
SummarySecurity update for binutils
Typesecurity
Severitymoderate
References1109412,1109413,1109414,1111996,1112534,1112535,1113247,1113252,1113255,1116827,1118644,1118830,1118831,1120640,1121034,1121035,1121056,1133131,1133232,1141913,1142772,1152590,1154016,1154025,CVE-2018-1000876,CVE-2018-17358,CVE-2018-17359,CVE-2018-17360,CVE-2018-17985,CVE-2018-18309,CVE-2018-18483,CVE-2018-18484,CVE-2018-18605,CVE-2018-18606,CVE-2018-18607,CVE-2018-19931,CVE-2018-19932,CVE-2018-20623,CVE-2018-20651,CVE-2018-20671,CVE-2018-6323,CVE-2018-6543,CVE-2018-6759,CVE-2018-6872,CVE-2018-7208,CVE-2018-7568,CVE-2018-7569,CVE-2018-7570,CVE-2018-7642,CVE-2018-7643,CVE-2018-8945,CVE-2019-1010180,ECO-368,SLE-6206
Description:

This update for binutils fixes the following issues:
binutils was updated to current 2.32 branch [jsc#ECO-368].
Includes following security fixes:



Update to binutils 2.32:


Advisory IDSUSE-SU-2019:2997-1
ReleasedMon Nov 18 15:16:38 2019
SummarySecurity update for ncurses
Typesecurity
Severitymoderate
References1103320,1154036,1154037,CVE-2019-17594,CVE-2019-17595
Description:

This update for ncurses fixes the following issues:
Security issues fixed:


Non-security issue fixed:


Advisory IDSUSE-SU-2019:3061-1
ReleasedMon Nov 25 17:34:22 2019
SummarySecurity update for gcc9
Typesecurity
Severitymoderate
References1114592,1135254,1141897,1142649,1142654,1148517,1149145,CVE-2019-14250,CVE-2019-15847,SLE-6533,SLE-6536
Description:



This update includes the GNU Compiler Collection 9.
A full changelog is provided by the GCC team on:
https://www.gnu.org/software/gcc/gcc-9/changes.html

The base system compiler libraries libgcc_s1, libstdc++6 and others are now built by the gcc 9 packages.
To use it, install 'gcc9' or 'gcc9-c++' or other compiler brands and use CC=gcc-9 / CXX=g++-9 during configuration for using it.

Security issues fixed:


Non-security issues fixed:


Advisory IDSUSE-SU-2019:3395-1
ReleasedMon Dec 30 14:05:06 2019
SummarySecurity update for mozilla-nspr, mozilla-nss
Typesecurity
Severitymoderate
References1141322,1158527,1159819,CVE-2018-18508,CVE-2019-11745,CVE-2019-17006
Description:

This update for mozilla-nspr, mozilla-nss fixes the following issues:
mozilla-nss was updated to NSS 3.47.1:
Security issues fixed:


mozilla-nspr was updated to version 4.23:


Advisory IDSUSE-RU-2020:10-1
ReleasedThu Jan 2 12:35:06 2020
SummaryRecommended update for gcc7
Typerecommended
Severitymoderate
References1146475
Description:

This update for gcc7 fixes the following issues:


Advisory IDSUSE-RU-2020:395-1
ReleasedTue Feb 18 14:16:48 2020
SummaryRecommended update for gcc7
Typerecommended
Severitymoderate
References1160086
Description:


This update for gcc7 fixes the following issue:



Advisory IDSUSE-RU-2020:453-1
ReleasedTue Feb 25 10:51:53 2020
SummaryRecommended update for binutils
Typerecommended
Severitymoderate
References1160590
Description:

This update for binutils fixes the following issues:


Advisory IDSUSE-RU-2020:525-1
ReleasedFri Feb 28 11:49:36 2020
SummaryRecommended update for pam
Typerecommended
Severitymoderate
References1164562
Description:

This update for pam fixes the following issues:


Advisory IDSUSE-RU-2020:689-1
ReleasedFri Mar 13 17:09:01 2020
SummaryRecommended update for pam
Typerecommended
Severitymoderate
References1166510
Description:


This update for PAM fixes the following issue:


Advisory IDSUSE-RU-2020:917-1
ReleasedFri Apr 3 15:02:25 2020
SummaryRecommended update for pam
Typerecommended
Severitymoderate
References1166510
Description:

This update for pam fixes the following issues:


Advisory IDSUSE-SU-2020:948-1
ReleasedWed Apr 8 07:44:21 2020
SummarySecurity update for gmp, gnutls, libnettle
Typesecurity
Severitymoderate
References1152692,1155327,1166881,1168345,CVE-2020-11501
Description:

This update for gmp, gnutls, libnettle fixes the following issues:
Security issue fixed:


FIPS related bugfixes:


Advisory IDSUSE-RU-2020:1226-1
ReleasedFri May 8 10:51:05 2020
SummaryRecommended update for gcc9
Typerecommended
Severitymoderate
References1149995,1152590,1167898
Description:

This update for gcc9 fixes the following issues:
This update ships the GCC 9.3 release.


Advisory IDSUSE-SU-2020:1294-1
ReleasedMon May 18 07:38:36 2020
SummarySecurity update for file
Typesecurity
Severitymoderate
References1154661,1169512,CVE-2019-18218
Description:

This update for file fixes the following issues:
Security issues fixed:


Non-security issue fixed:


Advisory IDSUSE-RU-2020:1328-1
ReleasedMon May 18 17:16:04 2020
SummaryRecommended update for grep
Typerecommended
Severitymoderate
References1155271
Description:

This update for grep fixes the following issues:


Advisory IDSUSE-SU-2020:1677-1
ReleasedThu Jun 18 18:16:39 2020
SummarySecurity update for mozilla-nspr, mozilla-nss
Typesecurity
Severityimportant
References1159819,1169746,1171978,CVE-2019-17006,CVE-2020-12399
Description:

This update for mozilla-nspr, mozilla-nss fixes the following issues:
mozilla-nss was updated to version 3.53

Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes
mozilla-nspr to version 4.25


Advisory IDSUSE-RU-2020:2000-1
ReleasedWed Jul 22 09:04:41 2020
SummaryRecommended update for efivar
Typerecommended
Severityimportant
References1100077,1101023,1120862,1127544
Description:

This update for efivar fixes the following issues:


Advisory IDSUSE-RU-2020:2083-1
ReleasedThu Jul 30 10:27:59 2020
SummaryRecommended update for diffutils
Typerecommended
Severitymoderate
References1156913
Description:

This update for diffutils fixes the following issue:


Advisory IDSUSE-RU-2020:2735-1
ReleasedThu Sep 24 13:32:25 2020
SummaryRecommended update for systemd-rpm-macros
Typerecommended
Severitymoderate
References1173034
Description:

This update for systemd-rpm-macros fixes the following issues:


Advisory IDSUSE-RU-2020:2782-1
ReleasedTue Sep 29 11:40:22 2020
SummaryRecommended update for systemd-rpm-macros
Typerecommended
Severityimportant
References1176932
Description:

This update for systemd-rpm-macros fixes the following issues:



Advisory IDSUSE-RU-2020:2863-1
ReleasedTue Oct 6 09:28:41 2020
SummaryRecommended update for efivar
Typerecommended
Severitymoderate
References1175989
Description:

This update for efivar fixes the following issues:


Advisory IDSUSE-SU-2020:2947-1
ReleasedFri Oct 16 15:23:07 2020
SummarySecurity update for gcc10, nvptx-tools
Typesecurity
Severitymoderate
References1172798,1172846,1173972,1174753,1174817,1175168,CVE-2020-13844
Description:

This update for gcc10, nvptx-tools fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.
The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by the gcc10 variants.
The new compiler variants are available with '-10' suffix, you can specify them via:
CC=gcc-10 CXX=g++-10
or similar commands.
For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
Changes in nvptx-tools:


Advisory IDSUSE-RU-2020:2983-1
ReleasedWed Oct 21 15:03:03 2020
SummaryRecommended update for file
Typerecommended
Severitymoderate
References1176123
Description:

This update for file fixes the following issues:


Advisory IDSUSE-SU-2020:3060-1
ReleasedWed Oct 28 08:09:21 2020
SummarySecurity update for binutils
Typesecurity
Severitymoderate
References1126826,1126829,1126831,1140126,1142649,1143609,1153768,1153770,1157755,1160254,1160590,1163333,1163744,CVE-2019-12972,CVE-2019-14250,CVE-2019-14444,CVE-2019-17450,CVE-2019-17451,CVE-2019-9074,CVE-2019-9075,CVE-2019-9077
Description:

This update for binutils fixes the following issues:
binutils was updated to version 2.35. (jsc#ECO-2373)
Update to binutils 2.35:




Update to binutils 2.34:



Update to binutils 2.33.1:



Advisory IDSUSE-SU-2020:3091-1
ReleasedThu Oct 29 16:35:37 2020
SummarySecurity update for MozillaThunderbird and mozilla-nspr
Typesecurity
Severityimportant
References1174230,1176384,1176756,1176899,1177977,CVE-2020-15673,CVE-2020-15676,CVE-2020-15677,CVE-2020-15678,CVE-2020-15683,CVE-2020-15969
Description:

This update for MozillaThunderbird and mozilla-nspr fixes the following issues:



Advisory IDSUSE-RU-2020:3462-1
ReleasedFri Nov 20 13:14:35 2020
SummaryRecommended update for pam and sudo
Typerecommended
Severitymoderate
References1174593,1177858,1178727
Description:

This update for pam and sudo fixes the following issue:
pam:


sudo:


Advisory IDSUSE-RU-2020:3620-1
ReleasedThu Dec 3 17:03:55 2020
SummaryRecommended update for pam
Typerecommended
Severitymoderate
References
Description:

This update for pam fixes the following issues:


Advisory IDSUSE-RU-2020:3640-1
ReleasedMon Dec 7 13:24:41 2020
SummaryRecommended update for binutils
Typerecommended
Severityimportant
References1179036,1179341
Description:

This update for binutils fixes the following issues:
Update binutils 2.35 branch to commit 1c5243df:


Update binutils to 2.35.1 and rebased branch diff:


Advisory IDSUSE-SU-2020:3749-1
ReleasedThu Dec 10 14:39:28 2020
SummarySecurity update for gcc7
Typesecurity
Severitymoderate
References1150164,1161913,1167939,1172798,1178577,1178614,1178624,1178675,CVE-2020-13844
Description:

This update for gcc7 fixes the following issues:


Advisory IDSUSE-RU-2020:3791-1
ReleasedMon Dec 14 17:39:19 2020
SummaryRecommended update for gzip
Typerecommended
Severitymoderate
References
Description:

This update for gzip fixes the following issue:


Advisory IDSUSE-OU-2020:3795-1
ReleasedMon Dec 14 17:43:26 2020
SummaryOptional update for systemd-rpm-macros
Typeoptional
Severitylow
References1059627,1178481,1179020
Description:

This update for systemd-rpm-macros fixes the following issues:


Advisory IDSUSE-RU-2021:79-1
ReleasedTue Jan 12 10:49:34 2021
SummaryRecommended update for gcc7
Typerecommended
Severitymoderate
References1167939
Description:

This update for gcc7 fixes the following issues:


Advisory IDSUSE-RU-2021:220-1
ReleasedTue Jan 26 14:00:51 2021
SummaryRecommended update for keyutils
Typerecommended
Severitymoderate
References1180603
Description:

This update for keyutils fixes the following issues:


Advisory IDSUSE-RU-2021:293-1
ReleasedWed Feb 3 12:52:34 2021
SummaryRecommended update for gmp
Typerecommended
Severitymoderate
References1180603
Description:

This update for gmp fixes the following issues:


Advisory IDSUSE-OU-2021:339-1
ReleasedMon Feb 8 13:16:07 2021
SummaryOptional update for pam
Typeoptional
Severitylow
References
Description:

This update for pam fixes the following issues:


This patch is optional to be installed - it doesn't fix any bugs.


Advisory IDSUSE-RU-2021:596-1
ReleasedThu Feb 25 10:26:30 2021
SummaryRecommended update for gcc7
Typerecommended
Severitymoderate
References1181618
Description:

This update for gcc7 fixes the following issues:


Advisory IDSUSE-RU-2021:707-1
ReleasedThu Mar 4 09:19:36 2021
SummaryRecommended update for systemd-rpm-macros
Typerecommended
Severitymoderate
References1177039
Description:

This update for systemd-rpm-macros fixes the following issues:




Advisory IDSUSE-RU-2021:784-1
ReleasedMon Mar 15 11:19:08 2021
SummaryRecommended update for efivar
Typerecommended
Severitymoderate
References1181967
Description:

This update for efivar fixes the following issues:


Advisory IDSUSE-RU-2021:795-1
ReleasedTue Mar 16 10:28:02 2021
SummaryRecommended update for systemd-rpm-macros
Typerecommended
Severitylow
References1182661,1183012,1183051
Description:

This update for systemd-rpm-macros fixes the following issues:


Advisory IDSUSE-RU-2021:924-1
ReleasedTue Mar 23 10:00:49 2021
SummaryRecommended update for filesystem
Typerecommended
Severitymoderate
References1078466,1146705,1175519,1178775,1180020,1180083,1180596,1181011,1181831,1183094
Description:

This update for filesystem the following issues:


This update for systemd fixes the following issues:


Advisory IDSUSE-SU-2021:974-1
ReleasedMon Mar 29 19:31:27 2021
SummarySecurity update for tar
Typesecurity
Severitylow
References1181131,CVE-2021-20193
Description:

This update for tar fixes the following issues:
CVE-2021-20193: Memory leak in read_header() in list.c (bsc#1181131)


Advisory IDSUSE-SU-2021:1007-1
ReleasedThu Apr 1 17:47:20 2021
SummarySecurity update for MozillaFirefox
Typesecurity
Severityimportant
References1183942,CVE-2021-23981,CVE-2021-23982,CVE-2021-23984,CVE-2021-23987
Description:

This update for MozillaFirefox fixes the following issues:


Advisory IDSUSE-RU-2021:1018-1
ReleasedTue Apr 6 14:29:13 2021
SummaryRecommended update for gzip
Typerecommended
Severitymoderate
References1180713
Description:

This update for gzip fixes the following issues:


Advisory IDSUSE-RU-2021:1289-1
ReleasedWed Apr 21 14:02:46 2021
SummaryRecommended update for gzip
Typerecommended
Severitymoderate
References1177047
Description:

This update for gzip fixes the following issues:


Advisory IDSUSE-RU-2021:1291-1
ReleasedWed Apr 21 14:04:06 2021
SummaryRecommended update for mpfr
Typerecommended
Severitymoderate
References1141190
Description:

This update for mpfr fixes the following issues:


Technical library fixes:


Advisory IDSUSE-RU-2021:1643-1
ReleasedWed May 19 13:51:48 2021
SummaryRecommended update for pam
Typerecommended
Severityimportant
References1181443,1184358,1185562
Description:

This update for pam fixes the following issues:


Advisory IDSUSE-RU-2021:1861-1
ReleasedFri Jun 4 09:59:40 2021
SummaryRecommended update for gcc10
Typerecommended
Severitymoderate
References1029961,1106014,1178577,1178624,1178675,1182016
Description:

This update for gcc10 fixes the following issues:


Advisory IDSUSE-RU-2021:1926-1
ReleasedThu Jun 10 08:38:14 2021
SummaryRecommended update for gcc
Typerecommended
Severitymoderate
References1096677
Description:

This update for gcc fixes the following issues:


Advisory IDSUSE-RU-2021:1935-1
ReleasedThu Jun 10 10:45:09 2021
SummaryRecommended update for gzip
Typerecommended
Severitymoderate
References1186642
Description:


This update for gzip fixes the following issue:


Advisory IDSUSE-RU-2021:2173-1
ReleasedMon Jun 28 14:59:45 2021
SummaryRecommended update for automake
Typerecommended
Severitymoderate
References1040589,1047218,1182604,1185540,1186049
Description:

This update for automake fixes the following issues:


This update for pcre fixes the following issues:

This update for brp-check-suse fixes the following issues:


Advisory IDSUSE-RU-2021:2193-1
ReleasedMon Jun 28 18:38:43 2021
SummaryRecommended update for tar
Typerecommended
Severitymoderate
References1184124
Description:

This update for tar fixes the following issues:


Advisory IDSUSE-SU-2021:2196-1
ReleasedTue Jun 29 09:41:39 2021
SummarySecurity update for lua53
Typesecurity
Severitymoderate
References1175448,1175449,CVE-2020-24370,CVE-2020-24371
Description:

This update for lua53 fixes the following issues:
Update to version 5.3.6:


Advisory IDSUSE-SU-2021:2320-1
ReleasedWed Jul 14 17:01:06 2021
SummarySecurity update for sqlite3
Typesecurity
Severityimportant
References1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701,CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327
Description:

This update for sqlite3 fixes the following issues:


Advisory IDSUSE-RU-2021:2395-1
ReleasedMon Jul 19 12:08:34 2021
SummaryRecommended update for efivar
Typerecommended
Severitymoderate
References1187386
Description:

This update for efivar provides the following fix:


Advisory IDSUSE-RU-2021:2899-1
ReleasedWed Sep 1 08:30:58 2021
SummaryRecommended update for systemd-rpm-macros
Typerecommended
Severitymoderate
References1186282,1187332
Description:

This update for systemd-rpm-macros fixes the following issues:


Advisory IDSUSE-RU-2021:2987-1
ReleasedThu Sep 9 00:00:13 2021
SummaryRecommended update for pesign
Typerecommended
Severitylow
References1184124
Description:

This update for pesign fixes the following issues:


Advisory IDSUSE-RU-2021:2993-1
ReleasedThu Sep 9 14:31:33 2021
SummaryRecommended update for gcc
Typerecommended
Severitymoderate
References1185348
Description:

This update for gcc fixes the following issues:


Advisory IDSUSE-RU-2021:2997-1
ReleasedThu Sep 9 14:37:34 2021
SummaryRecommended update for python3
Typerecommended
Severitymoderate
References1187338,1189659
Description:

This update for python3 fixes the following issues:


Advisory IDSUSE-RU-2021:3115-1
ReleasedThu Sep 16 14:04:26 2021
SummaryRecommended update for mozilla-nspr, mozilla-nss
Typerecommended
Severitymoderate
References1029961,1174697,1176206,1176934,1179382,1188891,CVE-2020-12400,CVE-2020-12401,CVE-2020-12403,CVE-2020-25648,CVE-2020-6829
Description:

This update for mozilla-nspr fixes the following issues:
mozilla-nspr was updated to version 4.32:



Mozilla NSS was updated to version 3.68:

update to NSS 3.67

update to NSS 3.66

update to NSS 3.65

update to NSS 3.64
disable_crypto_vsx.
  • bmo#1698320 - replace __builtin_cpu_supports('vsx') with
  • ppc_crypto_support() for clang.
  • bmo#1613235 - Add POWER ChaCha20 stream cipher vector
  • acceleration.
    Fixed in 3.63
    initialization to prevent build isses with GCC 4.8.
  • bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
  • scalar multiplication.
  • bmo#1683520 - ECCKiila P521, change syntax of nested structs
  • initialization to prevent build isses with GCC 4.8.
  • bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
  • scalar multiplication.
  • bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
  • bmo#1694214 - tstclnt can't enable middlebox compat mode.
  • bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
  • profiles.
  • bmo#1685880 - Minor fix to prevent unused variable on early return.
  • bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
  • with nss build.
  • bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
  • of root CA changes, CA list version 2.48.
  • bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
  • 'Chambers of Commerce' and 'Global Chambersign' roots.
  • bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
  • bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
  • bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
  • bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
  • from NSS.
  • bmo#1687822 - Turn off Websites trust bit for the “Staat der
  • Nederlanden Root CA - G3” root cert in NSS.
  • bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
  • Root - 2008' and 'Global Chambersign Root - 2008’.
  • bmo#1694291 - Tracing fixes for ECH.

  • update to NSS 3.62
    can corrupt 'cachedCertTable'
  • bmo#1690583 - Fix CH padding extension size calculation
  • bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
  • bmo#1690421 - Install packaged libabigail in docker-builds image
  • bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
  • bmo#1674819 - Fixup a51fae403328, enum type may be signed
  • bmo#1681585 - Add ECH support to selfserv
  • bmo#1681585 - Update ECH to Draft-09
  • bmo#1678398 - Add Export/Import functions for HPKE context
  • bmo#1678398 - Update HPKE to draft-07

  • update to NSS 3.61
    values under certain conditions.
  • bmo#1684300 - Fix default PBE iteration count when NSS is compiled
  • with NSS_DISABLE_DBM.
  • bmo#1651411 - Improve constant-timeness in RSA operations.
  • bmo#1677207 - Upgrade Google Test version to latest release.
  • bmo#1654332 - Add aarch64-make target to nss-try.

  • Update to NSS 3.60.1:
    Notable changes in NSS 3.60:
    Update to NSS 3.59.1:
    PKCS11 modules
    Update to NSS 3.59:
    Notable changes:

    Bugfixes
    root certs when SHA1 signatures are disabled.
  • bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
  • solve some test intermittents
  • bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
  • our CVE-2020-25648 fix that broke purple-discord (boo#1179382)
  • bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
  • bmo#1667989 - Fix gyp linking on Solaris
  • bmo#1668123 - Export CERT_AddCertToListHeadWithData and
  • CERT_AddCertToListTailWithData from libnss
  • bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
  • bmo#1663091 - Remove unnecessary assertions in the streaming
  • ASN.1 decoder that affected decoding certain PKCS8 private keys when using NSS debug builds
  • bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

  • update to NSS 3.58
    Bugs fixed:

    update to NSS 3.57

    update to NSS 3.56
    Notable changes
    detection.
  • bmo#1652729 - Add build flag to disable RC2 and relocate to
  • lib/freebl/deprecated.
  • bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
  • bmo#1588941 - Send empty certificate message when scheme selection
  • fails.
  • bmo#1652032 - Fix failure to build in Windows arm64 makefile
  • cross-compilation.
  • bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
  • bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
  • makefile target.
  • bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
  • bmo#1659814 - Fix interop.sh failures with newer tls-interop
  • commit and dependencies.
  • bmo#1656519 - NSPR dependency updated to 4.28

  • update to NSS 3.55
    Notable changes
    Relevant Bugfixes

    update to NSS 3.54
    Notable changes


    Bugs fixed
    Root Certification Authority; C=TW' root.
  • bmo#1645199 - Remove AddTrust root certificates.
  • bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
  • bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
  • certificate.
  • bmo#1618402 - Remove Symantec root certificates and disable email trust
  • bit.
  • bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
  • bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
  • bmo#1642153 - Fix infinite recursion building NSS.
  • bmo#1642638 - Fix fuzzing assertion crash.
  • bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
  • bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
  • bmo#1643557 - Fix numerous compile warnings in NSS.
  • bmo#1644774 - SSL gtests to use ClearServerCache when resetting
  • self-encrypt keys.
  • bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
  • bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.

  • Advisory IDSUSE-RU-2021:3182-1
    ReleasedTue Sep 21 17:04:26 2021
    SummaryRecommended update for file
    Typerecommended
    Severitymoderate
    References1189996
    Description:

    This update for file fixes the following issues:


    Advisory IDSUSE-SU-2021:3490-1
    ReleasedWed Oct 20 16:31:55 2021
    SummarySecurity update for ncurses
    Typesecurity
    Severitymoderate
    References1190793,CVE-2021-39537
    Description:

    This update for ncurses fixes the following issues:


    Advisory IDSUSE-RU-2021:3494-1
    ReleasedWed Oct 20 16:48:46 2021
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1190052
    Description:

    This update for pam fixes the following issues:


    Advisory IDSUSE-RU-2021:3510-1
    ReleasedTue Oct 26 11:22:15 2021
    SummaryRecommended update for pam
    Typerecommended
    Severityimportant
    References1191987
    Description:

    This update for pam fixes the following issues:


    Advisory IDSUSE-SU-2021:3529-1
    ReleasedWed Oct 27 09:23:32 2021
    SummarySecurity update for pcre
    Typesecurity
    Severitymoderate
    References1172973,1172974,CVE-2019-20838,CVE-2020-14155
    Description:

    This update for pcre fixes the following issues:
    Update pcre to version 8.45:


    Advisory IDSUSE-SU-2021:3616-1
    ReleasedThu Nov 4 12:29:16 2021
    SummarySecurity update for binutils
    Typesecurity
    Severitymoderate
    References1179898,1179899,1179900,1179901,1179902,1179903,1180451,1180454,1180461,1181452,1182252,1183511,1184620,1184794,CVE-2020-16590,CVE-2020-16591,CVE-2020-16592,CVE-2020-16593,CVE-2020-16598,CVE-2020-16599,CVE-2020-35448,CVE-2020-35493,CVE-2020-35496,CVE-2020-35507,CVE-2021-20197,CVE-2021-20284,CVE-2021-3487
    Description:

    This update for binutils fixes the following issues:
    Update to binutils 2.37:


    The semantics of the =follow-links option have also been slightly changed. When enabled, the option allows for the loading of symbol tables and string tables from the separate files which can be used to enhance the information displayed when dumping other sections, but it does not automatically imply that information from the separate files should be displayed.
    If other debug section display options are also enabled (eg '--debug-dump=info') then the contents of matching sections in both the main file and the separate debuginfo file *will* be displayed. This is because in most cases the debug section will only be present in one of the files.
    If however non-debug section display options are enabled (eg '--sections') then the contents of matching parts of the separate debuginfo file will *not* be displayed. This is because in most cases the user probably only wanted to load the symbol information from the separate debuginfo file. In order to change this behaviour a new command line option --process-links can be used. This will allow di0pslay options to applied to both the main file and any separate debuginfo files.

    Update to binutils 2.36:
    New features in the Assembler:

    * When setting the link order attribute of ELF sections, it is now possible to use a numeric section index instead of symbol name. * Added a .nop directive to generate a single no-op instruction in a target neutral manner. This instruction does have an effect on DWARF line number generation, if that is active. * Removed --reduce-memory-overheads and --hash-size as gas now uses hash tables that can be expand and shrink automatically.

    * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key Locker instructions. * Support non-absolute segment values for lcall and ljmp. * Add {disp16} pseudo prefix to x86 assembler. * Configure with --enable-x86-used-note by default for Linux/x86.

    * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1, Cortex-R82, Neoverse V1, and Neoverse N2 cores. * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call Stack Recorder Extension) and BRBE (Branch Record Buffer Extension) system registers. * Add support for Armv8-R and Armv8.7-A ISA extensions. * Add support for DSB memory nXS barrier, WFET and WFIT instruction for Armv8.7. * Add support for +csre feature for -march. Add CSR PDEC instruction for CSRE feature in AArch64. * Add support for +flagm feature for -march in Armv8.4 AArch64. * Add support for +ls64 feature for -march in Armv8.7 AArch64. Add atomic 64-byte load/store instructions for this feature. * Add support for +pauth (Pointer Authentication) feature for -march in AArch64.
    New features in the Linker:
    * Add --error-handling-script= command line option to allow a helper script to be invoked when an undefined symbol or a missing library is encountered. This option can be suppressed via the configure time switch: --enable-error-handling-script=no. * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark x86-64-{baseline|v[234]} ISA level as needed. * Add -z unique-symbol to avoid duplicated local symbol names. * The creation of PE format DLLs now defaults to using a more secure set of DLL characteristics. * The linker now deduplicates the types in .ctf sections. The new command-line option --ctf-share-types describes how to do this: its default value, share-unconflicted, produces the most compact output. * The linker now omits the 'variable section' from .ctf sections by default, saving space. This is almost certainly what you want unless you are working on a project that has its own analogue of symbol tables that are not reflected in the ELF symtabs.
    New features in other binary tools:
    * The ar tool's previously unused l modifier is now used for specifying dependencies of a static library. The arguments of this option (or --record-libdeps long form option) will be stored verbatim in the __.LIBDEP member of the archive, which the linker may read at link time. * Readelf can now display the contents of LTO symbol table sections when asked to do so via the --lto-syms command line option. * Readelf now accepts the -C command line option to enable the demangling of symbol names. In addition the --demangle=