openSUSE-2018-486 Security update for Mozilla Thunderbird important openSUSE Leap 15.0 Update This update for Mozilla Thunderbird to version 52.8 fixes the following issues: Security issues fixed (MFSA 2018-13, boo#1092548): - CVE-2018-5183: Backport critical security fixes in Skia - CVE-2018-5154: Use-after-free with SVG animations and clip paths - CVE-2018-5155: Use-after-free with SVG animations and text paths - CVE-2018-5159: Integer overflow and out-of-bounds write in Skia - CVE-2018-5168: Lightweight themes can be installed without user interaction - CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension - CVE-2018-5150: Memory safety bugs fixed in Firefox 60, Firefox ESR 52.8, and Thunderbird 52.8 - CVE-2018-5161: Hang via malformed headers (bsc#1093970) - CVE-2018-5162: Encrypted mail leaks plaintext through src attribute (bsc#1093971) - CVE-2018-5170: Filename spoofing for external attachments (bsc#1093972) - CVE-2018-5184: Full plaintext recovery in S/MIME via chosen-ciphertext attack (bsc#1093969) - CVE-2018-5185: Leaking plaintext through HTML forms (bsc#1093973) MozillaThunderbird-52.8-lp150.3.3.2.src.rpm MozillaThunderbird-52.8-lp150.3.3.2.x86_64.rpm MozillaThunderbird-buildsymbols-52.8-lp150.3.3.2.x86_64.rpm MozillaThunderbird-debuginfo-52.8-lp150.3.3.2.x86_64.rpm MozillaThunderbird-debugsource-52.8-lp150.3.3.2.x86_64.rpm MozillaThunderbird-devel-52.8-lp150.3.3.2.x86_64.rpm MozillaThunderbird-translations-common-52.8-lp150.3.3.2.x86_64.rpm MozillaThunderbird-translations-other-52.8-lp150.3.3.2.x86_64.rpm openSUSE-2018-473 Recommended update for timezone, timezone-java low openSUSE Leap 15.0 Update This update provides the latest timezone information (2018e) for your system, including following changes: - North Korea switches back from +0830 to +09 on 2018-05-05. - Ireland's standard time is in the summer, with negative DST offset to standard time used in Winter (bsc#1073299) timezone-java-2018e-lp150.2.3.3.noarch.rpm timezone-java-2018e-lp150.2.3.3.src.rpm timezone-2018e-lp150.2.3.3.src.rpm timezone-2018e-lp150.2.3.3.x86_64.rpm timezone-debuginfo-2018e-lp150.2.3.3.x86_64.rpm timezone-debugsource-2018e-lp150.2.3.3.x86_64.rpm timezone-2018e-lp150.2.3.3.i586.rpm timezone-debuginfo-2018e-lp150.2.3.3.i586.rpm timezone-debugsource-2018e-lp150.2.3.3.i586.rpm openSUSE-2018-474 Security update for enigmail moderate openSUSE Leap 15.0 Update This update for enigmail fixes multiple issues. Security issues fixed: - CVE-2017-17688: CFB gadget attacks allowed to exfiltrate plaintext out of encrypted emails. enigmail now fails on GnuPG integrity check warnings for old Algorithms (bsc#1093151) - CVE-2017-17689: CBC gadget attacks allows to exfiltrate plaintext out of encrypted emails (bsc#1093152) enigmail-2.0.4-lp150.2.3.1.src.rpm enigmail-2.0.4-lp150.2.3.1.x86_64.rpm openSUSE-2018-512 Recommended update for MozillaFirefox low openSUSE Leap 15.0 Update This update for MozillaFirefox to version 60.0.1 ESR fixes the following issues: - Avoid overly long cycle collector pauses with some add-ons installed - After unckecking the "Sponsored Stories" option, the New Tab page now immediately stops displaying "Sponsored content" cards - Use the right default background when opening tabs or windows in high contrast mode - Restored translations of the Preferences panels when using a language pack MozillaFirefox-60.0.1-lp150.3.3.2.src.rpm MozillaFirefox-60.0.1-lp150.3.3.2.x86_64.rpm MozillaFirefox-branding-upstream-60.0.1-lp150.3.3.2.x86_64.rpm MozillaFirefox-buildsymbols-60.0.1-lp150.3.3.2.x86_64.rpm MozillaFirefox-debuginfo-60.0.1-lp150.3.3.2.x86_64.rpm MozillaFirefox-debugsource-60.0.1-lp150.3.3.2.x86_64.rpm MozillaFirefox-devel-60.0.1-lp150.3.3.2.x86_64.rpm MozillaFirefox-translations-common-60.0.1-lp150.3.3.2.x86_64.rpm MozillaFirefox-translations-other-60.0.1-lp150.3.3.2.x86_64.rpm openSUSE-2018-510 Recommended update for prosody moderate openSUSE Leap 15.0 Update This update for prosody to version 0.10.1 fixes the following issues (boo#1093671): - Ensure user archives are purged when a user account is deleted - Various other upstream bug fixes and improvements prosody-0.10.1-lp150.3.3.1.src.rpm prosody-0.10.1-lp150.3.3.1.x86_64.rpm prosody-debuginfo-0.10.1-lp150.3.3.1.x86_64.rpm prosody-debugsource-0.10.1-lp150.3.3.1.x86_64.rpm openSUSE-2018-485 Recommended update for php7 low openSUSE Leap 15.0 Update This update for php7 fixes the following issues: - boo#1093025 main package requires wwwrun:www user - better workaround for [boo#1089487]: build mod_phpN.so instead of libphpN.so apache2-mod_php7-7.2.5-lp150.2.3.1.x86_64.rpm apache2-mod_php7-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-7.2.5-lp150.2.3.1.src.rpm php7-7.2.5-lp150.2.3.1.x86_64.rpm php7-bcmath-7.2.5-lp150.2.3.1.x86_64.rpm php7-bcmath-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-bz2-7.2.5-lp150.2.3.1.x86_64.rpm php7-bz2-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-calendar-7.2.5-lp150.2.3.1.x86_64.rpm php7-calendar-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-ctype-7.2.5-lp150.2.3.1.x86_64.rpm php7-ctype-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-curl-7.2.5-lp150.2.3.1.x86_64.rpm php7-curl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-dba-7.2.5-lp150.2.3.1.x86_64.rpm php7-dba-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-debugsource-7.2.5-lp150.2.3.1.x86_64.rpm php7-devel-7.2.5-lp150.2.3.1.x86_64.rpm php7-dom-7.2.5-lp150.2.3.1.x86_64.rpm php7-dom-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-embed-7.2.5-lp150.2.3.1.x86_64.rpm php7-embed-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-enchant-7.2.5-lp150.2.3.1.x86_64.rpm php7-enchant-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-exif-7.2.5-lp150.2.3.1.x86_64.rpm php7-exif-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-fastcgi-7.2.5-lp150.2.3.1.x86_64.rpm php7-fastcgi-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-fileinfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-fileinfo-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-firebird-7.2.5-lp150.2.3.1.x86_64.rpm php7-firebird-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-fpm-7.2.5-lp150.2.3.1.x86_64.rpm php7-fpm-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-ftp-7.2.5-lp150.2.3.1.x86_64.rpm php7-ftp-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-gd-7.2.5-lp150.2.3.1.x86_64.rpm php7-gd-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-gettext-7.2.5-lp150.2.3.1.x86_64.rpm php7-gettext-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-gmp-7.2.5-lp150.2.3.1.x86_64.rpm php7-gmp-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-iconv-7.2.5-lp150.2.3.1.x86_64.rpm php7-iconv-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-intl-7.2.5-lp150.2.3.1.x86_64.rpm php7-intl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-json-7.2.5-lp150.2.3.1.x86_64.rpm php7-json-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-ldap-7.2.5-lp150.2.3.1.x86_64.rpm php7-ldap-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-mbstring-7.2.5-lp150.2.3.1.x86_64.rpm php7-mbstring-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-mysql-7.2.5-lp150.2.3.1.x86_64.rpm php7-mysql-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-odbc-7.2.5-lp150.2.3.1.x86_64.rpm php7-odbc-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-opcache-7.2.5-lp150.2.3.1.x86_64.rpm php7-opcache-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-openssl-7.2.5-lp150.2.3.1.x86_64.rpm php7-openssl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-pcntl-7.2.5-lp150.2.3.1.x86_64.rpm php7-pcntl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-pdo-7.2.5-lp150.2.3.1.x86_64.rpm php7-pdo-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-pear-7.2.5-lp150.2.3.1.noarch.rpm php7-pear-Archive_Tar-7.2.5-lp150.2.3.1.noarch.rpm php7-pgsql-7.2.5-lp150.2.3.1.x86_64.rpm php7-pgsql-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-phar-7.2.5-lp150.2.3.1.x86_64.rpm php7-phar-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-posix-7.2.5-lp150.2.3.1.x86_64.rpm php7-posix-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-readline-7.2.5-lp150.2.3.1.x86_64.rpm php7-readline-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-shmop-7.2.5-lp150.2.3.1.x86_64.rpm php7-shmop-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-snmp-7.2.5-lp150.2.3.1.x86_64.rpm php7-snmp-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-soap-7.2.5-lp150.2.3.1.x86_64.rpm php7-soap-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-sockets-7.2.5-lp150.2.3.1.x86_64.rpm php7-sockets-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-sodium-7.2.5-lp150.2.3.1.x86_64.rpm php7-sodium-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-sqlite-7.2.5-lp150.2.3.1.x86_64.rpm php7-sqlite-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-sysvmsg-7.2.5-lp150.2.3.1.x86_64.rpm php7-sysvmsg-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-sysvsem-7.2.5-lp150.2.3.1.x86_64.rpm php7-sysvsem-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-sysvshm-7.2.5-lp150.2.3.1.x86_64.rpm php7-sysvshm-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-tidy-7.2.5-lp150.2.3.1.x86_64.rpm php7-tidy-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-tokenizer-7.2.5-lp150.2.3.1.x86_64.rpm php7-tokenizer-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-wddx-7.2.5-lp150.2.3.1.x86_64.rpm php7-wddx-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-xmlreader-7.2.5-lp150.2.3.1.x86_64.rpm php7-xmlreader-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-xmlrpc-7.2.5-lp150.2.3.1.x86_64.rpm php7-xmlrpc-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-xmlwriter-7.2.5-lp150.2.3.1.x86_64.rpm php7-xmlwriter-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-xsl-7.2.5-lp150.2.3.1.x86_64.rpm php7-xsl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-zip-7.2.5-lp150.2.3.1.x86_64.rpm php7-zip-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm php7-zlib-7.2.5-lp150.2.3.1.x86_64.rpm php7-zlib-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm apache2-mod_php7-7.2.5-lp150.2.3.1.i586.rpm apache2-mod_php7-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-7.2.5-lp150.2.3.1.i586.rpm php7-bcmath-7.2.5-lp150.2.3.1.i586.rpm php7-bcmath-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-bz2-7.2.5-lp150.2.3.1.i586.rpm php7-bz2-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-calendar-7.2.5-lp150.2.3.1.i586.rpm php7-calendar-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-ctype-7.2.5-lp150.2.3.1.i586.rpm php7-ctype-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-curl-7.2.5-lp150.2.3.1.i586.rpm php7-curl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-dba-7.2.5-lp150.2.3.1.i586.rpm php7-dba-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-debugsource-7.2.5-lp150.2.3.1.i586.rpm php7-devel-7.2.5-lp150.2.3.1.i586.rpm php7-dom-7.2.5-lp150.2.3.1.i586.rpm php7-dom-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-embed-7.2.5-lp150.2.3.1.i586.rpm php7-embed-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-enchant-7.2.5-lp150.2.3.1.i586.rpm php7-enchant-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-exif-7.2.5-lp150.2.3.1.i586.rpm php7-exif-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-fastcgi-7.2.5-lp150.2.3.1.i586.rpm php7-fastcgi-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-fileinfo-7.2.5-lp150.2.3.1.i586.rpm php7-fileinfo-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-firebird-7.2.5-lp150.2.3.1.i586.rpm php7-firebird-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-fpm-7.2.5-lp150.2.3.1.i586.rpm php7-fpm-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-ftp-7.2.5-lp150.2.3.1.i586.rpm php7-ftp-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-gd-7.2.5-lp150.2.3.1.i586.rpm php7-gd-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-gettext-7.2.5-lp150.2.3.1.i586.rpm php7-gettext-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-gmp-7.2.5-lp150.2.3.1.i586.rpm php7-gmp-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-iconv-7.2.5-lp150.2.3.1.i586.rpm php7-iconv-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-intl-7.2.5-lp150.2.3.1.i586.rpm php7-intl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-json-7.2.5-lp150.2.3.1.i586.rpm php7-json-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-ldap-7.2.5-lp150.2.3.1.i586.rpm php7-ldap-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-mbstring-7.2.5-lp150.2.3.1.i586.rpm php7-mbstring-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-mysql-7.2.5-lp150.2.3.1.i586.rpm php7-mysql-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-odbc-7.2.5-lp150.2.3.1.i586.rpm php7-odbc-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-opcache-7.2.5-lp150.2.3.1.i586.rpm php7-opcache-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-openssl-7.2.5-lp150.2.3.1.i586.rpm php7-openssl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-pcntl-7.2.5-lp150.2.3.1.i586.rpm php7-pcntl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-pdo-7.2.5-lp150.2.3.1.i586.rpm php7-pdo-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-pgsql-7.2.5-lp150.2.3.1.i586.rpm php7-pgsql-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-phar-7.2.5-lp150.2.3.1.i586.rpm php7-phar-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-posix-7.2.5-lp150.2.3.1.i586.rpm php7-posix-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-readline-7.2.5-lp150.2.3.1.i586.rpm php7-readline-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-shmop-7.2.5-lp150.2.3.1.i586.rpm php7-shmop-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-snmp-7.2.5-lp150.2.3.1.i586.rpm php7-snmp-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-soap-7.2.5-lp150.2.3.1.i586.rpm php7-soap-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-sockets-7.2.5-lp150.2.3.1.i586.rpm php7-sockets-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-sodium-7.2.5-lp150.2.3.1.i586.rpm php7-sodium-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-sqlite-7.2.5-lp150.2.3.1.i586.rpm php7-sqlite-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-sysvmsg-7.2.5-lp150.2.3.1.i586.rpm php7-sysvmsg-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-sysvsem-7.2.5-lp150.2.3.1.i586.rpm php7-sysvsem-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-sysvshm-7.2.5-lp150.2.3.1.i586.rpm php7-sysvshm-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-tidy-7.2.5-lp150.2.3.1.i586.rpm php7-tidy-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-tokenizer-7.2.5-lp150.2.3.1.i586.rpm php7-tokenizer-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-wddx-7.2.5-lp150.2.3.1.i586.rpm php7-wddx-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-xmlreader-7.2.5-lp150.2.3.1.i586.rpm php7-xmlreader-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-xmlrpc-7.2.5-lp150.2.3.1.i586.rpm php7-xmlrpc-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-xmlwriter-7.2.5-lp150.2.3.1.i586.rpm php7-xmlwriter-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-xsl-7.2.5-lp150.2.3.1.i586.rpm php7-xsl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-zip-7.2.5-lp150.2.3.1.i586.rpm php7-zip-debuginfo-7.2.5-lp150.2.3.1.i586.rpm php7-zlib-7.2.5-lp150.2.3.1.i586.rpm php7-zlib-debuginfo-7.2.5-lp150.2.3.1.i586.rpm openSUSE-2018-483 Recommended update for vsftpd important openSUSE Leap 15.0 Update This update for vsftpd fixes the following issue: - boo#1089088: vsftpd did not work if seccomp was enabled vsftpd-3.0.3-lp150.5.3.1.src.rpm vsftpd-3.0.3-lp150.5.3.1.x86_64.rpm vsftpd-debuginfo-3.0.3-lp150.5.3.1.x86_64.rpm vsftpd-debugsource-3.0.3-lp150.5.3.1.x86_64.rpm vsftpd-3.0.3-lp150.5.3.1.i586.rpm vsftpd-debuginfo-3.0.3-lp150.5.3.1.i586.rpm vsftpd-debugsource-3.0.3-lp150.5.3.1.i586.rpm openSUSE-2018-484 Recommended update for psmisc moderate openSUSE Leap 15.0 Update This update for psmisc fixes the following issues: - boo#1093665: fuser -m did not work for private mounts psmisc-23.0-lp150.4.3.1.src.rpm psmisc-23.0-lp150.4.3.1.x86_64.rpm psmisc-debuginfo-23.0-lp150.4.3.1.x86_64.rpm psmisc-debugsource-23.0-lp150.4.3.1.x86_64.rpm psmisc-lang-23.0-lp150.4.3.1.noarch.rpm psmisc-23.0-lp150.4.3.1.i586.rpm psmisc-debuginfo-23.0-lp150.4.3.1.i586.rpm psmisc-debugsource-23.0-lp150.4.3.1.i586.rpm openSUSE-2018-482 Recommended update for snapper moderate openSUSE Leap 15.0 Update This update for snapper fixes the following issues: - boo#1092103: snapper printed a warning related to non-UTF8 locales. The warning was moved to the documentation. libsnapper-devel-0.5.4-lp150.3.3.1.x86_64.rpm libsnapper4-0.5.4-lp150.3.3.1.x86_64.rpm libsnapper4-debuginfo-0.5.4-lp150.3.3.1.x86_64.rpm pam_snapper-0.5.4-lp150.3.3.1.x86_64.rpm pam_snapper-debuginfo-0.5.4-lp150.3.3.1.x86_64.rpm snapper-0.5.4-lp150.3.3.1.src.rpm snapper-0.5.4-lp150.3.3.1.x86_64.rpm snapper-debuginfo-0.5.4-lp150.3.3.1.x86_64.rpm snapper-debugsource-0.5.4-lp150.3.3.1.x86_64.rpm snapper-zypp-plugin-0.5.4-lp150.3.3.1.noarch.rpm libsnapper-devel-0.5.4-lp150.3.3.1.i586.rpm libsnapper4-0.5.4-lp150.3.3.1.i586.rpm libsnapper4-debuginfo-0.5.4-lp150.3.3.1.i586.rpm pam_snapper-0.5.4-lp150.3.3.1.i586.rpm pam_snapper-debuginfo-0.5.4-lp150.3.3.1.i586.rpm snapper-0.5.4-lp150.3.3.1.i586.rpm snapper-debuginfo-0.5.4-lp150.3.3.1.i586.rpm snapper-debugsource-0.5.4-lp150.3.3.1.i586.rpm openSUSE-2018-481 Recommended update for issue-generator moderate openSUSE Leap 15.0 Update This update for issue-generator fixes the following issues: - boo#1085196: the /etc/issue file was replaced and agetty reloaded even if there were no changes issue-generator-1.5-lp150.3.3.1.noarch.rpm issue-generator-1.5-lp150.3.3.1.src.rpm openSUSE-2018-480 Recommended update for SUSEConnect moderate openSUSE Leap 15.0 Update This update for SUSEConnect fixes the following issues: - boo#1093658: SUSEConnect did not specify all run-time dependencies of the rmt-client-setup script The following enhancement is included: - Do not automatically register ecommended products that are not mirrored by the registration proxy SUSEConnect-0.3.11-lp150.2.3.1.src.rpm SUSEConnect-0.3.11-lp150.2.3.1.x86_64.rpm openSUSE-2018-574 Recommended update for yast2-bootloader important openSUSE Leap 15.0 Update This update for yast2-bootloader fixes the following issues: - boo#1092417: MD RAID Disks were not listed in Guided Setup some complex setups that also contain physical partitions - boo#1043029: Propose fips boot parameter if it is used for installation on s390 - Avoid "Invalid partition table" on GPT disks by properly setting pmbr flag (boo#1093887) yast2-bootloader-4.0.35-lp150.2.5.1.src.rpm yast2-bootloader-4.0.35-lp150.2.5.1.x86_64.rpm yast2-bootloader-4.0.35-lp150.2.5.1.i586.rpm openSUSE-2018-497 Recommended update for gcompris-qt low openSUSE Leap 15.0 Update This recommended update for gcompris-qt fixes the following issue (boo#1093988): - text corrections and translation updates - UI position and element interaction corrections - fixes to audio in several activities - corrections and improvements to multiple activities gcompris-qt-voices was updated to match. gcompris-qt-voices-0~20180517-lp150.2.4.1.noarch.rpm gcompris-qt-voices-0~20180517-lp150.2.4.1.src.rpm gcompris-qt-0.91-lp150.3.3.1.src.rpm gcompris-qt-0.91-lp150.3.3.1.x86_64.rpm gcompris-qt-activities-0.91-lp150.3.3.1.noarch.rpm gcompris-qt-debuginfo-0.91-lp150.3.3.1.x86_64.rpm gcompris-qt-debugsource-0.91-lp150.3.3.1.x86_64.rpm gcompris-qt-lang-0.91-lp150.3.3.1.noarch.rpm openSUSE-2018-502 Recommended update for yast2-country moderate openSUSE Leap 15.0 Update This update for yast2-country fixes the following issues: - yast2 firstboot failed to run on a system with empty /etc/locale.conf (boo#1092979) yast2-country-4.0.22-lp150.2.3.1.src.rpm yast2-country-4.0.22-lp150.2.3.1.x86_64.rpm yast2-country-data-4.0.22-lp150.2.3.1.x86_64.rpm yast2-country-4.0.22-lp150.2.3.1.i586.rpm yast2-country-data-4.0.22-lp150.2.3.1.i586.rpm openSUSE-2018-501 Recommended update for yast2-storage-ng moderate openSUSE Leap 15.0 Update This update for yast2-storage-ng fixes the following issues: - more detailed description about the origin of the partitioning layout (boo#1089274) - issues detecting of candidate disks for installation (boo#1091047) - On Power9, 'No Operating System found' may have been printed after first boot (boo#1090019) - several translation issues (boo#1081837, boo#1081601) The following work-arounds are included: - To consider MD RAIDs as BIOS RAIDs the environment variable LIBSTORAGE_MDPART can be used (boo#1092417) yast2-storage-ng-4.0.183-lp150.2.3.1.src.rpm yast2-storage-ng-4.0.183-lp150.2.3.1.x86_64.rpm yast2-storage-ng-4.0.183-lp150.2.3.1.i586.rpm openSUSE-2018-503 Recommended update for sbd moderate openSUSE Leap 15.0 Update This update for updates sbd fixes the following issues: - SBD did not log some important messages (boo#1091839) - sbd-md failed to return an error if it failed to list any devices (boo#1086650) sbd-1.3.1+20180507.e102d9e-lp150.2.3.1.src.rpm sbd-1.3.1+20180507.e102d9e-lp150.2.3.1.x86_64.rpm sbd-debuginfo-1.3.1+20180507.e102d9e-lp150.2.3.1.x86_64.rpm sbd-debugsource-1.3.1+20180507.e102d9e-lp150.2.3.1.x86_64.rpm openSUSE-2018-504 Recommended update for yast2-packager moderate openSUSE Leap 15.0 Update This update for yast2-packager fixes the following issues: - The YaST2 Packager module could not be started from the programs menus (boo#1087352) yast2-packager-4.0.62-lp150.2.3.1.src.rpm yast2-packager-4.0.62-lp150.2.3.1.x86_64.rpm yast2-packager-4.0.62-lp150.2.3.1.i586.rpm openSUSE-2018-508 Recommended update for cloud-init moderate openSUSE Leap 15.0 Update This update for cloud-init fixes the following issues: - issues in cloud-init locating datasources (boo#1089824, boo#1093501) cloud-init-18.2-lp150.2.3.1.src.rpm cloud-init-18.2-lp150.2.3.1.x86_64.rpm cloud-init-config-suse-18.2-lp150.2.3.1.x86_64.rpm cloud-init-doc-18.2-lp150.2.3.1.x86_64.rpm openSUSE-2018-524 Recommended update for libu2f-host, pam_u2f moderate openSUSE Leap 15.0 Update This update for libu2f-host, pam_u2f fixes the following issues: - Various bug fixes in libu2f 1.1.6, including added udev rules for more devices (boo#1094622) - Various bug fixes in pam_u2f 1.0.7, including an issue when using syslog as a debug facility (boo#1094622) libu2f-host-1.1.6-lp150.2.3.1.src.rpm libu2f-host-debuginfo-1.1.6-lp150.2.3.1.x86_64.rpm libu2f-host-debugsource-1.1.6-lp150.2.3.1.x86_64.rpm libu2f-host-devel-1.1.6-lp150.2.3.1.x86_64.rpm libu2f-host-doc-1.1.6-lp150.2.3.1.x86_64.rpm libu2f-host0-1.1.6-lp150.2.3.1.x86_64.rpm libu2f-host0-debuginfo-1.1.6-lp150.2.3.1.x86_64.rpm u2f-host-1.1.6-lp150.2.3.1.x86_64.rpm u2f-host-debuginfo-1.1.6-lp150.2.3.1.x86_64.rpm pam_u2f-1.0.7-lp150.2.3.1.src.rpm pam_u2f-1.0.7-lp150.2.3.1.x86_64.rpm pam_u2f-debuginfo-1.0.7-lp150.2.3.1.x86_64.rpm pam_u2f-debugsource-1.0.7-lp150.2.3.1.x86_64.rpm openSUSE-2018-506 Recommended update for yast2-installation moderate openSUSE Leap 15.0 Update This update for yast2-installation fixes the following issues: - Attempts to set read-only property to default BTRFS subvolume failed if the filesystem already existed on disk (boo#1091047) - Unmounting a filesystem may after installation/upgrade, log a warning (boo#1090018) yast2-installation-4.0.60-lp150.2.3.1.noarch.rpm yast2-installation-4.0.60-lp150.2.3.1.src.rpm openSUSE-2018-525 Recommended update for python-kiwi moderate openSUSE Leap 15.0 Update This updates python-kiwi to version 9.15.1 fixing the following issues: * Fix zypper add lock operations * Make container compression a configuration option * Return file name after archive or compression call * Allow docker root import from uncompressed file * Add uninstall pacakges type * Some simple code cleaning dracut-kiwi-lib-9.15.2-lp150.2.3.1.x86_64.rpm dracut-kiwi-live-9.15.2-lp150.2.3.1.x86_64.rpm dracut-kiwi-oem-dump-9.15.2-lp150.2.3.1.x86_64.rpm dracut-kiwi-oem-repart-9.15.2-lp150.2.3.1.x86_64.rpm dracut-kiwi-overlay-9.15.2-lp150.2.3.1.x86_64.rpm kiwi-man-pages-9.15.2-lp150.2.3.1.x86_64.rpm kiwi-pxeboot-9.15.2-lp150.2.3.1.x86_64.rpm kiwi-tools-9.15.2-lp150.2.3.1.x86_64.rpm kiwi-tools-debuginfo-9.15.2-lp150.2.3.1.x86_64.rpm python-kiwi-9.15.2-lp150.2.3.1.src.rpm python-kiwi-debugsource-9.15.2-lp150.2.3.1.x86_64.rpm python2-kiwi-9.15.2-lp150.2.3.1.x86_64.rpm python3-kiwi-9.15.2-lp150.2.3.1.x86_64.rpm dracut-kiwi-lib-9.15.2-lp150.2.3.1.i586.rpm dracut-kiwi-live-9.15.2-lp150.2.3.1.i586.rpm dracut-kiwi-oem-dump-9.15.2-lp150.2.3.1.i586.rpm dracut-kiwi-oem-repart-9.15.2-lp150.2.3.1.i586.rpm dracut-kiwi-overlay-9.15.2-lp150.2.3.1.i586.rpm kiwi-man-pages-9.15.2-lp150.2.3.1.i586.rpm kiwi-pxeboot-9.15.2-lp150.2.3.1.i586.rpm kiwi-tools-9.15.2-lp150.2.3.1.i586.rpm kiwi-tools-debuginfo-9.15.2-lp150.2.3.1.i586.rpm python-kiwi-debugsource-9.15.2-lp150.2.3.1.i586.rpm python2-kiwi-9.15.2-lp150.2.3.1.i586.rpm python3-kiwi-9.15.2-lp150.2.3.1.i586.rpm openSUSE-2018-507 Recommended update for yast2-pkg-bindings moderate openSUSE Leap 15.0 Update This update for yast2-pkg-bindings fixes the following issue: - Errors when refreshing the zypp-plugin-spacewalk service on a system not managed by spacewalk (boo#1086768) yast2-pkg-bindings-devel-doc-4.0.10-lp150.2.3.1.noarch.rpm yast2-pkg-bindings-devel-doc-4.0.10-lp150.2.3.1.src.rpm yast2-pkg-bindings-4.0.10-lp150.2.3.1.src.rpm yast2-pkg-bindings-4.0.10-lp150.2.3.1.x86_64.rpm yast2-pkg-bindings-debuginfo-4.0.10-lp150.2.3.1.x86_64.rpm yast2-pkg-bindings-debugsource-4.0.10-lp150.2.3.1.x86_64.rpm yast2-pkg-bindings-4.0.10-lp150.2.3.1.i586.rpm yast2-pkg-bindings-debuginfo-4.0.10-lp150.2.3.1.i586.rpm yast2-pkg-bindings-debugsource-4.0.10-lp150.2.3.1.i586.rpm openSUSE-2018-500 Recommended update for fence-agents moderate openSUSE Leap 15.0 Update This update for fence-agents fixes the following issues: - Fence_sbd failed to start, an issue related to Python 3 encoding (boo#1082871) fence-agents-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.src.rpm fence-agents-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm fence-agents-debuginfo-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm fence-agents-debugsource-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm fence-agents-devel-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm openSUSE-2018-505 Recommended update for patterns-base moderate openSUSE Leap 15.0 Update This update for patterns-base fixes the following issues: - x11 pattern corrections (boo#1086663) - terminfo was missing from the minimal_base pattern (boo#1081747) - bootloader variants were listed in patterns (boo#1064265) patterns-base-20171206-lp150.15.3.1.src.rpm patterns-base-32bit-20171206-lp150.15.3.1.x86_64.rpm patterns-base-apparmor-20171206-lp150.15.3.1.x86_64.rpm patterns-base-apparmor-32bit-20171206-lp150.15.3.1.x86_64.rpm patterns-base-apparmor_opt-20171206-lp150.15.3.1.x86_64.rpm patterns-base-base-20171206-lp150.15.3.1.x86_64.rpm patterns-base-base-32bit-20171206-lp150.15.3.1.x86_64.rpm patterns-base-basesystem-20171206-lp150.15.3.1.x86_64.rpm patterns-base-console-20171206-lp150.15.3.1.x86_64.rpm patterns-base-documentation-20171206-lp150.15.3.1.x86_64.rpm patterns-base-enhanced_base-20171206-lp150.15.3.1.x86_64.rpm patterns-base-enhanced_base-32bit-20171206-lp150.15.3.1.x86_64.rpm patterns-base-enhanced_base_opt-20171206-lp150.15.3.1.x86_64.rpm patterns-base-minimal_base-20171206-lp150.15.3.1.x86_64.rpm patterns-base-minimal_base-32bit-20171206-lp150.15.3.1.x86_64.rpm patterns-base-sw_management-20171206-lp150.15.3.1.x86_64.rpm patterns-base-sw_management-32bit-20171206-lp150.15.3.1.x86_64.rpm patterns-base-transactional_base-20171206-lp150.15.3.1.x86_64.rpm patterns-base-update_test-20171206-lp150.15.3.1.x86_64.rpm patterns-base-x11-20171206-lp150.15.3.1.x86_64.rpm patterns-base-x11-32bit-20171206-lp150.15.3.1.x86_64.rpm patterns-base-x11_enhanced-20171206-lp150.15.3.1.x86_64.rpm patterns-base-x11_enhanced-32bit-20171206-lp150.15.3.1.x86_64.rpm patterns-base-x11_opt-20171206-lp150.15.3.1.x86_64.rpm openSUSE-2018-526 Recommended update for google-compute-engine moderate openSUSE Leap 15.0 Update This update brings google-compute-engine to version 20180510, fixing the following issues: * Prevent delay in configuring IP forwarding routes. * Include new google-network-daemon * Add google-network-daemon.suse init script for SysV * Stop shipping deprecated google-ip-forwarding-daemon service * Install google_oslogin_nss_cache binary into oslogin package * Include libnss cache as part of the OS Login package. * Fix conflict with other applications that use curl and SSL. google-compute-engine-20180510-lp150.2.3.1.src.rpm google-compute-engine-init-20180510-lp150.2.3.1.noarch.rpm google-compute-engine-oslogin-20180510-lp150.2.3.1.x86_64.rpm google-compute-engine-oslogin-debuginfo-20180510-lp150.2.3.1.x86_64.rpm google-compute-engine-oslogin-20180510-lp150.2.3.1.i586.rpm google-compute-engine-oslogin-32bit-20180510-lp150.2.3.1.x86_64.rpm google-compute-engine-oslogin-32bit-debuginfo-20180510-lp150.2.3.1.x86_64.rpm google-compute-engine-oslogin-debuginfo-20180510-lp150.2.3.1.i586.rpm openSUSE-2018-498 Recommended update for bind moderate openSUSE Leap 15.0 Update This update for bind fixes the following issues: - boo#1093338: bind-chrootenv contained some chroot related files in error - boo#1092283: bind created /etc/rndc.key during installation instead of during first boot bind-9.11.2-lp150.8.3.1.src.rpm bind-9.11.2-lp150.8.3.1.x86_64.rpm bind-chrootenv-9.11.2-lp150.8.3.1.x86_64.rpm bind-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm bind-debugsource-9.11.2-lp150.8.3.1.x86_64.rpm bind-devel-9.11.2-lp150.8.3.1.x86_64.rpm bind-doc-9.11.2-lp150.8.3.1.noarch.rpm bind-lwresd-9.11.2-lp150.8.3.1.x86_64.rpm bind-lwresd-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm bind-utils-9.11.2-lp150.8.3.1.x86_64.rpm bind-utils-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libbind9-160-9.11.2-lp150.8.3.1.x86_64.rpm libbind9-160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libdns169-9.11.2-lp150.8.3.1.x86_64.rpm libdns169-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libirs-devel-9.11.2-lp150.8.3.1.x86_64.rpm libirs160-9.11.2-lp150.8.3.1.x86_64.rpm libirs160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libisc166-9.11.2-lp150.8.3.1.x86_64.rpm libisc166-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libisccc160-9.11.2-lp150.8.3.1.x86_64.rpm libisccc160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libisccfg160-9.11.2-lp150.8.3.1.x86_64.rpm libisccfg160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm liblwres160-9.11.2-lp150.8.3.1.x86_64.rpm liblwres160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm python3-bind-9.11.2-lp150.8.3.1.noarch.rpm bind-9.11.2-lp150.8.3.1.i586.rpm bind-chrootenv-9.11.2-lp150.8.3.1.i586.rpm bind-debuginfo-9.11.2-lp150.8.3.1.i586.rpm bind-debugsource-9.11.2-lp150.8.3.1.i586.rpm bind-devel-32bit-9.11.2-lp150.8.3.1.x86_64.rpm bind-devel-9.11.2-lp150.8.3.1.i586.rpm bind-lwresd-9.11.2-lp150.8.3.1.i586.rpm bind-lwresd-debuginfo-9.11.2-lp150.8.3.1.i586.rpm bind-utils-9.11.2-lp150.8.3.1.i586.rpm bind-utils-debuginfo-9.11.2-lp150.8.3.1.i586.rpm libbind9-160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm libbind9-160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libbind9-160-9.11.2-lp150.8.3.1.i586.rpm libbind9-160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm libdns169-32bit-9.11.2-lp150.8.3.1.x86_64.rpm libdns169-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libdns169-9.11.2-lp150.8.3.1.i586.rpm libdns169-debuginfo-9.11.2-lp150.8.3.1.i586.rpm libirs-devel-9.11.2-lp150.8.3.1.i586.rpm libirs160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm libirs160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libirs160-9.11.2-lp150.8.3.1.i586.rpm libirs160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm libisc166-32bit-9.11.2-lp150.8.3.1.x86_64.rpm libisc166-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libisc166-9.11.2-lp150.8.3.1.i586.rpm libisc166-debuginfo-9.11.2-lp150.8.3.1.i586.rpm libisccc160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm libisccc160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libisccc160-9.11.2-lp150.8.3.1.i586.rpm libisccc160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm libisccfg160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm libisccfg160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm libisccfg160-9.11.2-lp150.8.3.1.i586.rpm libisccfg160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm liblwres160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm liblwres160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm liblwres160-9.11.2-lp150.8.3.1.i586.rpm liblwres160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm openSUSE-2018-527 Recommended update for openmpi2 low openSUSE Leap 15.0 Update This update for openmpi2 fixes the following issues: - boo#1092257: Support for QLogic Corp. FastLinQ QL41000 was missing libopenmpi2-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm libopenmpi_2_1_3-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm libopenmpi_2_1_3-gnu-hpc-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-gnu-hpc-devel-2.1.3-lp150.3.3.1.noarch.rpm openmpi2-gnu-hpc-devel-static-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-gnu-hpc-docs-2.1.3-lp150.3.3.1.noarch.rpm openmpi2-gnu-hpc-macros-devel-2.1.3-lp150.3.3.1.noarch.rpm openmpi_2_1_3-gnu-hpc-2.1.3-lp150.3.3.1.src.rpm openmpi_2_1_3-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm openmpi_2_1_3-gnu-hpc-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm openmpi_2_1_3-gnu-hpc-debugsource-2.1.3-lp150.3.3.1.x86_64.rpm openmpi_2_1_3-gnu-hpc-devel-2.1.3-lp150.3.3.1.x86_64.rpm openmpi_2_1_3-gnu-hpc-devel-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm openmpi_2_1_3-gnu-hpc-devel-static-2.1.3-lp150.3.3.1.x86_64.rpm openmpi_2_1_3-gnu-hpc-docs-2.1.3-lp150.3.3.1.x86_64.rpm openmpi_2_1_3-gnu-hpc-macros-devel-2.1.3-lp150.3.3.1.x86_64.rpm openmpi_2_1_3-gnu-hpc-testsuite-2.1.3-lp150.3.3.1.noarch.rpm openmpi_2_1_3-gnu-hpc-testsuite-2.1.3-lp150.3.3.1.src.rpm openmpi2-2.1.3-lp150.3.3.1.src.rpm openmpi2-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-config-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-debugsource-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-devel-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-devel-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-docs-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-libs-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-libs-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm openmpi2-testsuite-2.1.3-lp150.3.3.1.noarch.rpm openmpi2-testsuite-2.1.3-lp150.3.3.1.src.rpm openSUSE-2018-499 Recommended update for patterns-lxqt moderate openSUSE Leap 15.0 Update This update for patterns-lxqt fixes the following issues: - The LXQt pattern unnecessarily required some XFCE packages (boo#1094025) patterns-lxqt-20170319-lp150.2.3.1.src.rpm patterns-lxqt-lxqt-20170319-lp150.2.3.1.x86_64.rpm openSUSE-2018-528 Recommended update for virtualbox moderate openSUSE Leap 15.0 Update This recommended to virtualbox to version 5.2.12 (boo#1094158) resolves the following issues: - Serial: fixed possible data corruption when sending data under certain circumstances - Video recording: fixed starting / stopping recording under certain circumstances - Linux guests: support Linux 4.16 and EL 7.5 kernels - Linux guests: 3D fixes for recent guests The following tracked build fix is included: - boo#1093731: Fix build errors with Qt 5.11 python2-virtualbox-5.2.12-lp150.4.3.1.x86_64.rpm python2-virtualbox-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-5.2.12-lp150.4.3.1.src.rpm virtualbox-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-debugsource-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-devel-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-guest-desktop-icons-5.2.12-lp150.4.3.1.noarch.rpm virtualbox-guest-kmp-default-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm virtualbox-guest-kmp-default-debuginfo-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm virtualbox-guest-source-5.2.12-lp150.4.3.1.noarch.rpm virtualbox-guest-tools-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-guest-tools-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-guest-x11-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-guest-x11-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-host-kmp-default-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm virtualbox-host-kmp-default-debuginfo-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm virtualbox-host-source-5.2.12-lp150.4.3.1.noarch.rpm virtualbox-qt-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-qt-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-vnc-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-websrv-5.2.12-lp150.4.3.1.x86_64.rpm virtualbox-websrv-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm openSUSE-2018-495 Security update for enigmail moderate openSUSE Leap 15.0 Update This update for enigmail to version 2.0.5 fixes the following issues: Improvements on previous fixes on CVE-2017-17688, boo#1093151 and CVE-2017-17689, boo#1093152 (EFAIL): - do not decrypt MIME parts unnecessarily - improve Error Message for Missing Message Modification Code enigmail-2.0.5-lp150.2.6.1.src.rpm enigmail-2.0.5-lp150.2.6.1.x86_64.rpm openSUSE-2018-535 Security update for enigmail moderate openSUSE Leap 15.0 Update This update for enigmail to version 2.0.6 fixes the following issues: Security issues fixed: - Replies to a partially encrypted message may have revealed protected information: no longer display PGP/MIME message part followed by unencrypted data (boo#1094781) - Signature could be spoofed via Inline-PGP in HTML Mails The following bugs were fixed: - Filter actions could forget selected mail folder names enigmail-2.0.6-lp150.2.9.1.src.rpm enigmail-2.0.6-lp150.2.9.1.x86_64.rpm openSUSE-2018-518 Recommended update for GraphicsMagick moderate openSUSE Leap 15.0 Update GraphicsMagick was updated to 1.3.29: * Security Fixes: - GraphicsMagick is now participating in Google's oss-fuzz project - JNG: Require that the embedded JPEG image have the same dimensions as the JNG image as provided by JHDR. Avoids a heap write overflow. - MNG: Arbitrarily limit the number of loops which may be requested by the MNG LOOP chunk to 512 loops, and provide the '-define mng:maximum-loops=value' option in case the user wants to change the limit. This fixes a denial of service caused by large LOOP specifications. * Bug fixes: - DICOM: Pre/post rescale functions are temporarily disabled (until the implementation is fixed). - JPEG: Fix regression in last release in which reading some JPEG files produces the error "Improper call to JPEG library in state 201". - ICON: Some DIB-based Windows ICON files were reported as corrupt to an unexpectedly missing opacity mask image. - In-memory Blob I/O: Don't implicitly increase the allocation size due to seek offsets. - MNG: Detect and handle failure to allocate global PLTE. Fix divide by zero. - DrawGetStrokeDashArray(): Check for failure to allocate memory. - BlobToImage(): Now produces useful exception reports to cover the cases where 'magick' was not set and the file format could not be deduced from its header. * API Updates: - Wand API: Added MagickIsPaletteImage(), MagickIsOpaqueImage(), MagickIsMonochromeImage(), MagickIsGrayImage(), MagickHasColormap() based on contributions by Troy Patteson. - New structure ImageExtra added and Image 'clip_mask' member is replaced by 'extra' which points to private ImageExtra allocation. The ImageGetClipMask() function now provides access to the clip mask image. - New structure DrawInfoExtra and DrawInfo 'clip_path' is replaced by 'extra' which points to private DrawInfoExtra allocation. The DrawInfoGetClipPath() function now provides access to the clip path. - New core library functions: GetImageCompositeMask(), CompositeMaskImage(), CompositePathImage(), SetImageCompositeMask(), ImageGetClipMask(), ImageGetCompositeMask(), DrawInfoGetClipPath(), DrawInfoGetCompositePath() - Deprecated core library functions: RegisterStaticModules(), UnregisterStaticModules(). * Feature improvements: - Static modules (in static library or shared library without dynamically loadable modules) are now lazy-loaded using the same external interface as the lazy-loader for dynamic modules. This results in more similarity between the builds and reduces the fixed initialization overhead by only initializing the modules which are used. - SVG: The quality of SVG support has been significantly improved due to the efforts of Greg Wolfe. - FreeType/TTF rendering: Rendering fixes for opacity. GraphicsMagick-1.3.29-lp150.3.3.1.src.rpm GraphicsMagick-1.3.29-lp150.3.3.1.x86_64.rpm GraphicsMagick-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm GraphicsMagick-debugsource-1.3.29-lp150.3.3.1.x86_64.rpm GraphicsMagick-devel-1.3.29-lp150.3.3.1.x86_64.rpm libGraphicsMagick++-Q16-12-1.3.29-lp150.3.3.1.x86_64.rpm libGraphicsMagick++-Q16-12-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm libGraphicsMagick++-devel-1.3.29-lp150.3.3.1.x86_64.rpm libGraphicsMagick-Q16-3-1.3.29-lp150.3.3.1.x86_64.rpm libGraphicsMagick-Q16-3-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm libGraphicsMagick3-config-1.3.29-lp150.3.3.1.x86_64.rpm libGraphicsMagickWand-Q16-2-1.3.29-lp150.3.3.1.x86_64.rpm libGraphicsMagickWand-Q16-2-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm perl-GraphicsMagick-1.3.29-lp150.3.3.1.x86_64.rpm perl-GraphicsMagick-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm openSUSE-2018-515 Security update for the Linux Kernel important openSUSE Leap 15.0 Update The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2018-3639: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1087082). A new boot commandline option was introduced, "spec_store_bypass_disable", which can have following values: - auto: Kernel detects whether your CPU model contains an implementation of Speculative Store Bypass and picks the most appropriate mitigation. - on: disable Speculative Store Bypass - off: enable Speculative Store Bypass - prctl: Control Speculative Store Bypass per thread via prctl. Speculative Store Bypass is enabled for a process by default. The state of the control is inherited on fork. - seccomp: Same as "prctl" above, but all seccomp threads will disable SSB unless they explicitly opt out. The default is "seccomp", meaning programs need explicit opt-in into the mitigation. Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing: - "Vulnerable" - "Mitigation: Speculative Store Bypass disabled" - "Mitigation: Speculative Store Bypass disabled via prctl" - "Mitigation: Speculative Store Bypass disabled via prctl and seccomp" The following non-security bugs were fixed: - allow_unsupported: add module tainting on feature use (FATE#323394). - powerpc/64/kexec: fix race in kexec when XIVE is shutdown (bsc#1088273). - reiserfs: mark read-write mode unsupported (FATE#323394). - reiserfs: package in separate KMP (FATE#323394). kernel-debug-4.12.14-lp150.12.4.1.nosrc.rpm True kernel-debug-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-debug-base-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-debug-base-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-debug-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-debug-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-debug-devel-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-debug-devel-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-default-4.12.14-lp150.12.4.1.nosrc.rpm True kernel-default-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-default-base-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-default-base-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-default-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-default-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-default-devel-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-default-devel-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-docs-4.12.14-lp150.12.4.1.noarch.rpm True kernel-docs-4.12.14-lp150.12.4.1.nosrc.rpm True kernel-docs-html-4.12.14-lp150.12.4.1.noarch.rpm True kernel-kvmsmall-4.12.14-lp150.12.4.1.nosrc.rpm True kernel-kvmsmall-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-kvmsmall-base-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-kvmsmall-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-kvmsmall-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-kvmsmall-devel-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-obs-build-4.12.14-lp150.12.4.1.src.rpm True kernel-obs-build-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-obs-build-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-obs-qa-4.12.14-lp150.12.4.1.src.rpm True kernel-obs-qa-4.12.14-lp150.12.4.1.x86_64.rpm True kernel-devel-4.12.14-lp150.12.4.1.noarch.rpm True kernel-macros-4.12.14-lp150.12.4.1.noarch.rpm True kernel-source-4.12.14-lp150.12.4.1.noarch.rpm True kernel-source-4.12.14-lp150.12.4.1.src.rpm True kernel-source-vanilla-4.12.14-lp150.12.4.1.noarch.rpm True kernel-syms-4.12.14-lp150.12.4.1.src.rpm True kernel-syms-4.12.14-lp150.12.4.1.x86_64.rpm True openSUSE-2018-520 Security update for wireshark moderate openSUSE Leap 15.0 Update This update for wireshark fixes the following issues: Minor vulnerabilities that could be used to trigger dissector crashes or cause excessive memory use by making Wireshark read specially crafted packages from the network or capture files (boo#1094301): - CVE-2018-11356: DNS dissector crash - CVE-2018-11357: Multiple dissectors could consume excessive memory - CVE-2018-11358: Q.931 dissector crash - CVE-2018-11359: The RRC dissector and other dissectors could crash - CVE-2018-11360: GSM A DTAP dissector crash - CVE-2018-11362: LDSS dissector crash This update to version 2.4.7 also contains bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-2.4.7.html libwireshark9-2.4.7-lp150.2.3.1.x86_64.rpm libwireshark9-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm libwiretap7-2.4.7-lp150.2.3.1.x86_64.rpm libwiretap7-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm libwscodecs1-2.4.7-lp150.2.3.1.x86_64.rpm libwscodecs1-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm libwsutil8-2.4.7-lp150.2.3.1.x86_64.rpm libwsutil8-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm wireshark-2.4.7-lp150.2.3.1.src.rpm wireshark-2.4.7-lp150.2.3.1.x86_64.rpm wireshark-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm wireshark-debugsource-2.4.7-lp150.2.3.1.x86_64.rpm wireshark-devel-2.4.7-lp150.2.3.1.x86_64.rpm wireshark-ui-qt-2.4.7-lp150.2.3.1.x86_64.rpm wireshark-ui-qt-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm openSUSE-2018-521 Recommended update for gajim, python-nbxmpp low openSUSE Leap 15.0 Update This update for gajim and python-nbxmpp fixes the following issues: - gajim plugin installer did not work correctly due to being unable to locate required certificates (boo#1094343) - python-nbxmpp did not have the correct, dependent version, causes gajium crashes on start-up (boo#1093009) gajim-1.0.3-lp150.3.3.1.noarch.rpm gajim-1.0.3-lp150.3.3.1.src.rpm gajim-lang-1.0.3-lp150.3.3.1.noarch.rpm python-nbxmpp-0.6.6-lp150.2.3.1.src.rpm python2-nbxmpp-0.6.6-lp150.2.3.1.noarch.rpm python2-nbxmpp-doc-0.6.6-lp150.2.3.1.noarch.rpm python3-nbxmpp-0.6.6-lp150.2.3.1.noarch.rpm python3-nbxmpp-doc-0.6.6-lp150.2.3.1.noarch.rpm openSUSE-2018-545 Optional update for firewalld low openSUSE Leap 15.0 Update This update for firewalld fixes the following issues: - minor translation updates and typo fixes (boo#1094051) firewall-applet-0.5.3-lp150.2.3.1.noarch.rpm firewall-config-0.5.3-lp150.2.3.1.noarch.rpm firewall-macros-0.5.3-lp150.2.3.1.noarch.rpm firewalld-0.5.3-lp150.2.3.1.noarch.rpm firewalld-0.5.3-lp150.2.3.1.src.rpm firewalld-lang-0.5.3-lp150.2.3.1.noarch.rpm python3-firewall-0.5.3-lp150.2.3.1.noarch.rpm openSUSE-2018-532 Security update for pdns moderate openSUSE Leap 15.0 Update This update for pdns fixes the following issues: Security issues fixed: - CVE-2018-1046: Fix an issue with replaying a specially crafted PCAP file that can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution (bsc#1092540). pdns-4.1.2-lp150.3.3.1.src.rpm pdns-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-geoip-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-geoip-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-godbc-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-godbc-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-ldap-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-ldap-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-lua-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-lua-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-mydns-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-mydns-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-mysql-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-mysql-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-postgresql-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-postgresql-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-remote-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-remote-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-sqlite3-4.1.2-lp150.3.3.1.x86_64.rpm pdns-backend-sqlite3-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm pdns-debugsource-4.1.2-lp150.3.3.1.x86_64.rpm openSUSE-2018-536 Recommended update for live-net-installer moderate openSUSE Leap 15.0 Update This update for live-net-installer fixes the following issues: - Fixes installation from GNOME live media (boo#1094842) live-net-installer-1.0-lp150.3.3.1.noarch.rpm live-net-installer-1.0-lp150.3.3.1.src.rpm openSUSE-2018-537 Recommended update for fate moderate openSUSE Leap 15.0 Update This update for fate fixes the following issues: - New or imported features are sometimes not shown/editable (bsc#1094520) - explicitely select feature if it is the first one (bsc#1081921) - various ECO related improvements (bsc#1080586) - Prefs could have invalid Products (bsc#1088478) fate-1.6.0.5-lp150.2.3.1.src.rpm fate-1.6.0.5-lp150.2.3.1.x86_64.rpm fate-debuginfo-1.6.0.5-lp150.2.3.1.x86_64.rpm openSUSE-2018-554 Optional update for geotiff moderate openSUSE Leap 15.0 Update This update for geotiff fixes the following issues: - Incorrect path for library in .pc file of devel subpackage (boo#1094802) geotiff-1.4.2-lp150.2.3.1.src.rpm geotiff-1.4.2-lp150.2.3.1.x86_64.rpm geotiff-debuginfo-1.4.2-lp150.2.3.1.x86_64.rpm geotiff-debugsource-1.4.2-lp150.2.3.1.x86_64.rpm geotiff-devel-1.4.2-lp150.2.3.1.x86_64.rpm libgeotiff2-1.4.2-lp150.2.3.1.x86_64.rpm libgeotiff2-debuginfo-1.4.2-lp150.2.3.1.x86_64.rpm openSUSE-2018-566 Recommended update for shim low openSUSE Leap 15.0 Update This update for shim fixes the following issues: - Show a countdown menu before reset. (bsc#1092000) shim-14-lp150.8.5.1.src.rpm shim-14-lp150.8.5.1.x86_64.rpm shim-debuginfo-14-lp150.8.5.1.x86_64.rpm shim-debugsource-14-lp150.8.5.1.x86_64.rpm openSUSE-2018-555 Recommended update for syncthing moderate openSUSE Leap 15.0 Update This update for syncthing fixes the following issue: - Syncthing attempted to update itself, which is not in line with distribution policy (boo#1095169) syncthing-0.14.46-lp150.3.3.1.src.rpm syncthing-0.14.46-lp150.3.3.1.x86_64.rpm openSUSE-2018-556 Recommended update for xfce4-branding-openSUSE low openSUSE Leap 15.0 Update This update for xfce4-branding-openSUSE fixes the following issues: - XFCE branding was incorrect (boo#1095192) exo-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm libgarcon-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm libxfce4ui-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm midori-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm openSUSE-xfce-icon-theme-4.12.0-lp150.5.3.1.noarch.rpm thunar-volman-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm xfce4-branding-openSUSE-4.12.0-lp150.5.3.1.src.rpm xfce4-notifyd-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm xfce4-panel-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm xfce4-power-manager-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm xfce4-session-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm xfce4-settings-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm xfdesktop-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm xfwm4-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm openSUSE-2018-557 Security update for git important openSUSE Leap 15.0 Update This update for fixes the following security issues: * path sanity-checks on NTFS can read arbitrary memory (CVE-2018-11233, boo#1095218) * arbitrary code execution when recursively cloning a malicious repository (CVE-2018-11235, boo#1095219) git-2.16.4-lp150.2.3.1.src.rpm git-2.16.4-lp150.2.3.1.x86_64.rpm git-arch-2.16.4-lp150.2.3.1.x86_64.rpm git-core-2.16.4-lp150.2.3.1.x86_64.rpm git-core-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm git-credential-gnome-keyring-2.16.4-lp150.2.3.1.x86_64.rpm git-credential-gnome-keyring-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm git-credential-libsecret-2.16.4-lp150.2.3.1.x86_64.rpm git-credential-libsecret-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm git-cvs-2.16.4-lp150.2.3.1.x86_64.rpm git-daemon-2.16.4-lp150.2.3.1.x86_64.rpm git-daemon-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm git-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm git-debugsource-2.16.4-lp150.2.3.1.x86_64.rpm git-doc-2.16.4-lp150.2.3.1.noarch.rpm git-email-2.16.4-lp150.2.3.1.x86_64.rpm git-gui-2.16.4-lp150.2.3.1.x86_64.rpm git-p4-2.16.4-lp150.2.3.1.x86_64.rpm git-svn-2.16.4-lp150.2.3.1.x86_64.rpm git-svn-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm git-web-2.16.4-lp150.2.3.1.x86_64.rpm gitk-2.16.4-lp150.2.3.1.x86_64.rpm git-2.16.4-lp150.2.3.1.i586.rpm git-arch-2.16.4-lp150.2.3.1.i586.rpm git-core-2.16.4-lp150.2.3.1.i586.rpm git-core-debuginfo-2.16.4-lp150.2.3.1.i586.rpm git-credential-gnome-keyring-2.16.4-lp150.2.3.1.i586.rpm git-credential-gnome-keyring-debuginfo-2.16.4-lp150.2.3.1.i586.rpm git-credential-libsecret-2.16.4-lp150.2.3.1.i586.rpm git-credential-libsecret-debuginfo-2.16.4-lp150.2.3.1.i586.rpm git-cvs-2.16.4-lp150.2.3.1.i586.rpm git-daemon-2.16.4-lp150.2.3.1.i586.rpm git-daemon-debuginfo-2.16.4-lp150.2.3.1.i586.rpm git-debuginfo-2.16.4-lp150.2.3.1.i586.rpm git-debugsource-2.16.4-lp150.2.3.1.i586.rpm git-email-2.16.4-lp150.2.3.1.i586.rpm git-gui-2.16.4-lp150.2.3.1.i586.rpm git-p4-2.16.4-lp150.2.3.1.i586.rpm git-svn-2.16.4-lp150.2.3.1.i586.rpm git-svn-debuginfo-2.16.4-lp150.2.3.1.i586.rpm git-web-2.16.4-lp150.2.3.1.i586.rpm gitk-2.16.4-lp150.2.3.1.i586.rpm openSUSE-2018-548 Recommended update for kglobalaccel moderate openSUSE Leap 15.0 Update This update for kglobalaccel fixes the following issues: - Task switcher was randomly ignored, the user had to pres ALT-TAB several times to activate it (kde#394689, boo#1094931) kglobalaccel-5.45.0-lp150.2.3.1.src.rpm kglobalaccel-debugsource-5.45.0-lp150.2.3.1.x86_64.rpm kglobalaccel-devel-5.45.0-lp150.2.3.1.x86_64.rpm kglobalaccel5-5.45.0-lp150.2.3.1.x86_64.rpm kglobalaccel5-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm libKF5GlobalAccel5-5.45.0-lp150.2.3.1.x86_64.rpm libKF5GlobalAccel5-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm libKF5GlobalAccel5-lang-5.45.0-lp150.2.3.1.noarch.rpm libKF5GlobalAccelPrivate5-5.45.0-lp150.2.3.1.x86_64.rpm libKF5GlobalAccelPrivate5-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm kglobalaccel-debugsource-5.45.0-lp150.2.3.1.i586.rpm kglobalaccel-devel-32bit-5.45.0-lp150.2.3.1.x86_64.rpm kglobalaccel-devel-5.45.0-lp150.2.3.1.i586.rpm kglobalaccel5-5.45.0-lp150.2.3.1.i586.rpm kglobalaccel5-debuginfo-5.45.0-lp150.2.3.1.i586.rpm libKF5GlobalAccel5-32bit-5.45.0-lp150.2.3.1.x86_64.rpm libKF5GlobalAccel5-32bit-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm libKF5GlobalAccel5-5.45.0-lp150.2.3.1.i586.rpm libKF5GlobalAccel5-debuginfo-5.45.0-lp150.2.3.1.i586.rpm libKF5GlobalAccelPrivate5-5.45.0-lp150.2.3.1.i586.rpm libKF5GlobalAccelPrivate5-debuginfo-5.45.0-lp150.2.3.1.i586.rpm openSUSE-2018-561 Recommended update for plasma5-pk-updates low openSUSE Leap 15.0 Update This update for plasma5-pk-updates fixes the following issues: - boo#1093743: Some Italian translations were missing plasma5-pk-updates-0.3.2-lp150.9.3.1.src.rpm plasma5-pk-updates-0.3.2-lp150.9.3.1.x86_64.rpm plasma5-pk-updates-debuginfo-0.3.2-lp150.9.3.1.x86_64.rpm plasma5-pk-updates-debugsource-0.3.2-lp150.9.3.1.x86_64.rpm plasma5-pk-updates-lang-0.3.2-lp150.9.3.1.noarch.rpm openSUSE-2018-596 Security update for prosody moderate openSUSE Leap 15.0 Update This update for prosody to version 0.10.2 fixes the following issues: This security issue was fixed: - CVE-2018-10847: Prevent insufficient validation of client-provided parameters during XMPP stream restarts. Authenticated users may have overriden the realm associated with their session, potentially bypassing security policies and allowing impersonation (bsc#1094890). These non-security issues were fixed: - mod_websocket: Store the request object on the session for use by other modules - mod_c2s: Avoid concatenating potential nil value - core.certmanager: Allow all non-whitespace in service name - mod_disco: Skip code specific to disco on user accounts - mod_bosh: Store the normalized hostname on session - MUC: Fix error logged when no persistent rooms present prosody-0.10.2-lp150.3.6.2.src.rpm prosody-0.10.2-lp150.3.6.2.x86_64.rpm prosody-debuginfo-0.10.2-lp150.3.6.2.x86_64.rpm prosody-debugsource-0.10.2-lp150.3.6.2.x86_64.rpm openSUSE-2018-562 Recommended update for syslog-ng moderate openSUSE Leap 15.0 Update This update for syslog-ng fixes the following issue: - syslog-ng did not start when network was not yet running during boot (boo#1077975) libevtlog-3_14-0-3.14.1-lp150.2.3.1.x86_64.rpm libevtlog-3_14-0-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-3.14.1-lp150.2.3.1.src.rpm syslog-ng-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-curl-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-curl-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-debugsource-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-devel-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-geoip-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-geoip-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-python-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-python-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-redis-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-redis-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-smtp-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-smtp-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-sql-3.14.1-lp150.2.3.1.x86_64.rpm syslog-ng-sql-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm openSUSE-2018-563 Recommended update for blender low openSUSE Leap 15.0 Update This update for blender fixes the following issues: - Missing cycles headers causing broken GPU rendering with i.e CUDA (boo#1094777) blender-2.79b-lp150.2.3.1.src.rpm blender-2.79b-lp150.2.3.1.x86_64.rpm blender-debuginfo-2.79b-lp150.2.3.1.x86_64.rpm blender-debugsource-2.79b-lp150.2.3.1.x86_64.rpm blender-devel-2.79b-lp150.2.3.1.noarch.rpm blender-lang-2.79b-lp150.2.3.1.noarch.rpm openSUSE-2018-565 Recommended update for fvwm2 low openSUSE Leap 15.0 Update This update for fvwm2 fixes the following issues: Use update-alternatives for desktop selection (boo#1080494) fvwm2-2.6.7-lp150.2.3.1.src.rpm fvwm2-2.6.7-lp150.2.3.1.x86_64.rpm fvwm2-debuginfo-2.6.7-lp150.2.3.1.x86_64.rpm fvwm2-debugsource-2.6.7-lp150.2.3.1.x86_64.rpm openSUSE-2018-599 Security update for xen important openSUSE Leap 15.0 Update This update for xen to version 4.10.1 fixes several issues (bsc#1027519). These security issues were fixed: - CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631). - CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562). This non-security issue was fixed: - Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) xen-4.10.1_04-lp150.2.3.1.src.rpm xen-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-debugsource-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-devel-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-doc-html-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-libs-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-libs-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-tools-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-tools-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-tools-domU-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-tools-domU-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-debugsource-4.10.1_04-lp150.2.3.1.i586.rpm xen-devel-4.10.1_04-lp150.2.3.1.i586.rpm xen-libs-32bit-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-libs-32bit-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm xen-libs-4.10.1_04-lp150.2.3.1.i586.rpm xen-libs-debuginfo-4.10.1_04-lp150.2.3.1.i586.rpm xen-tools-domU-4.10.1_04-lp150.2.3.1.i586.rpm xen-tools-domU-debuginfo-4.10.1_04-lp150.2.3.1.i586.rpm openSUSE-2018-598 Security update for ImageMagick moderate openSUSE Leap 15.0 Update This update for ImageMagick to version 7.0.7-34 fixes the following issues: The following security issue was fixed: - Fixed numerous use of uninitialized values, integer overflow, memory exceeded, and timeouts. The following non-security issues were fixed: - Added support for reading eXIf chunks to the PNG coder. - Improved clip / composite mask handling. - Restore SetImageAlpha() behavior. - Fix -clip and -mask options. - Missing break when checking "compliance" element. ImageMagick-7.0.7.34-lp150.2.3.1.src.rpm ImageMagick-7.0.7.34-lp150.2.3.1.x86_64.rpm ImageMagick-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm ImageMagick-debugsource-7.0.7.34-lp150.2.3.1.x86_64.rpm ImageMagick-devel-7.0.7.34-lp150.2.3.1.x86_64.rpm ImageMagick-doc-7.0.7.34-lp150.2.3.1.noarch.rpm ImageMagick-extra-7.0.7.34-lp150.2.3.1.x86_64.rpm ImageMagick-extra-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagick++-7_Q16HDRI4-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagick++-devel-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagickCore-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagickWand-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm perl-PerlMagick-7.0.7.34-lp150.2.3.1.x86_64.rpm perl-PerlMagick-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm ImageMagick-7.0.7.34-lp150.2.3.1.i586.rpm ImageMagick-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm ImageMagick-debugsource-7.0.7.34-lp150.2.3.1.i586.rpm ImageMagick-devel-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm ImageMagick-devel-7.0.7.34-lp150.2.3.1.i586.rpm ImageMagick-extra-7.0.7.34-lp150.2.3.1.i586.rpm ImageMagick-extra-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagick++-7_Q16HDRI4-7.0.7.34-lp150.2.3.1.i586.rpm libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm libMagick++-devel-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagick++-devel-7.0.7.34-lp150.2.3.1.i586.rpm libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagickCore-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.i586.rpm libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm libMagickWand-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.i586.rpm libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm perl-PerlMagick-7.0.7.34-lp150.2.3.1.i586.rpm perl-PerlMagick-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm openSUSE-2018-573 Security update for xdg-utils important openSUSE Leap 15.0 Update This update for xdg-utils fixes this security issues: - CVE-2017-18266: The open_envvar function in xdg-open did not validate strings launching the program specified by the BROWSER environment variable, which might allowed remote attackers to conduct argument-injection attacks via a crafted URL (bsc#1093086). xdg-utils-20170508-lp150.3.3.2.noarch.rpm xdg-utils-20170508-lp150.3.3.2.src.rpm openSUSE-2018-576 Recommended update for tar moderate openSUSE Leap 15.0 Update This update for tar to version 1.30 fixes the following issues: - Report erroneous use of position-sensitive options. - --numeric-owner now affects private headers too. - Fixed the --delay-directory-restore option - The --warnings=none option now suppresses all warnings - Fixed reporting of hardlink mismatches during compare This update also replaces a previously patched security fix with the full upstream version: - Member names containing '..' components are now skipped when extracting tar-1.30-lp150.2.3.2.src.rpm tar-1.30-lp150.2.3.2.x86_64.rpm tar-backup-scripts-1.30-lp150.2.3.2.noarch.rpm tar-debuginfo-1.30-lp150.2.3.2.x86_64.rpm tar-debugsource-1.30-lp150.2.3.2.x86_64.rpm tar-doc-1.30-lp150.2.3.2.noarch.rpm tar-lang-1.30-lp150.2.3.2.noarch.rpm tar-rmt-1.30-lp150.2.3.2.x86_64.rpm tar-rmt-debuginfo-1.30-lp150.2.3.2.x86_64.rpm tar-tests-1.30-lp150.2.3.2.x86_64.rpm tar-tests-debuginfo-1.30-lp150.2.3.2.x86_64.rpm tar-1.30-lp150.2.3.2.i586.rpm tar-debuginfo-1.30-lp150.2.3.2.i586.rpm tar-debugsource-1.30-lp150.2.3.2.i586.rpm tar-rmt-1.30-lp150.2.3.2.i586.rpm tar-rmt-debuginfo-1.30-lp150.2.3.2.i586.rpm tar-tests-1.30-lp150.2.3.2.i586.rpm tar-tests-debuginfo-1.30-lp150.2.3.2.i586.rpm openSUSE-2018-600 Security update for glibc moderate openSUSE Leap 15.0 Update This update for glibc fixes the following issues: This security issue was fixed: - Fixed an buffer overwrite issue in memcpy for Knights Landing CPUs (boo#1092877, CVE-2018-11237) glibc-2.26-lp150.11.3.2.src.rpm glibc-2.26-lp150.11.3.2.x86_64.rpm glibc-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-debugsource-2.26-lp150.11.3.2.x86_64.rpm glibc-devel-2.26-lp150.11.3.2.x86_64.rpm glibc-devel-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-devel-static-2.26-lp150.11.3.2.x86_64.rpm glibc-extra-2.26-lp150.11.3.2.x86_64.rpm glibc-extra-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-html-2.26-lp150.11.3.2.noarch.rpm glibc-i18ndata-2.26-lp150.11.3.2.noarch.rpm glibc-info-2.26-lp150.11.3.2.noarch.rpm glibc-locale-2.26-lp150.11.3.2.x86_64.rpm glibc-locale-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-profile-2.26-lp150.11.3.2.x86_64.rpm nscd-2.26-lp150.11.3.2.x86_64.rpm nscd-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-testsuite-src-2.26-lp150.11.3.2.nosrc.rpm glibc-utils-2.26-lp150.11.3.2.x86_64.rpm glibc-utils-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-utils-src-2.26-lp150.11.3.2.nosrc.rpm glibc-utils-src-debugsource-2.26-lp150.11.3.2.x86_64.rpm glibc-2.26-lp150.11.3.2.i586.rpm glibc-debuginfo-2.26-lp150.11.3.2.i586.rpm glibc-debugsource-2.26-lp150.11.3.2.i586.rpm glibc-devel-2.26-lp150.11.3.2.i586.rpm glibc-devel-debuginfo-2.26-lp150.11.3.2.i586.rpm glibc-devel-static-2.26-lp150.11.3.2.i586.rpm glibc-extra-2.26-lp150.11.3.2.i586.rpm glibc-extra-debuginfo-2.26-lp150.11.3.2.i586.rpm glibc-locale-2.26-lp150.11.3.2.i586.rpm glibc-locale-debuginfo-2.26-lp150.11.3.2.i586.rpm glibc-profile-2.26-lp150.11.3.2.i586.rpm nscd-2.26-lp150.11.3.2.i586.rpm nscd-debuginfo-2.26-lp150.11.3.2.i586.rpm glibc-2.26-lp150.11.3.2.i686.rpm glibc-2.26-lp150.11.3.2.nosrc.rpm glibc-32bit-2.26-lp150.11.3.2.x86_64.rpm glibc-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-debuginfo-2.26-lp150.11.3.2.i686.rpm glibc-debugsource-2.26-lp150.11.3.2.i686.rpm glibc-devel-2.26-lp150.11.3.2.i686.rpm glibc-devel-32bit-2.26-lp150.11.3.2.x86_64.rpm glibc-devel-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-devel-debuginfo-2.26-lp150.11.3.2.i686.rpm glibc-devel-static-2.26-lp150.11.3.2.i686.rpm glibc-devel-static-32bit-2.26-lp150.11.3.2.x86_64.rpm glibc-locale-2.26-lp150.11.3.2.i686.rpm glibc-locale-32bit-2.26-lp150.11.3.2.x86_64.rpm glibc-locale-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-locale-debuginfo-2.26-lp150.11.3.2.i686.rpm glibc-profile-2.26-lp150.11.3.2.i686.rpm glibc-profile-32bit-2.26-lp150.11.3.2.x86_64.rpm glibc-utils-2.26-lp150.11.3.2.i586.rpm glibc-utils-32bit-2.26-lp150.11.3.2.x86_64.rpm glibc-utils-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm glibc-utils-debuginfo-2.26-lp150.11.3.2.i586.rpm glibc-utils-src-debugsource-2.26-lp150.11.3.2.i586.rpm openSUSE-2018-601 Security update for slf4j important openSUSE Leap 15.0 Update This update for slf4j fixes the following security issue: - CVE-2018-8088: Remote attackers could have bypassed intended access restrictions via crafted data. Disallow EventData deserialization by default from now on (bsc#1085970). slf4j-1.7.12-lp150.4.3.1.noarch.rpm slf4j-1.7.12-lp150.4.3.1.src.rpm slf4j-javadoc-1.7.12-lp150.4.3.1.noarch.rpm slf4j-manual-1.7.12-lp150.4.3.1.noarch.rpm openSUSE-2018-602 Security update for libvirt important openSUSE Leap 15.0 Update This update for libvirt fixes the following issues: This update fixes the following security issue: - Added support for 'ssbd' and 'virt-ssbd' CPUID feature bits (CVE-2018-3639, boo#1092885) libvirt-4.0.0-lp150.7.3.1.src.rpm libvirt-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-admin-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-admin-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-client-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-client-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-config-network-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-config-nwfilter-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-interface-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-interface-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-libxl-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-libxl-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-lxc-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-lxc-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-network-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-network-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-nodedev-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-nodedev-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-nwfilter-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-nwfilter-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-qemu-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-qemu-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-secret-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-secret-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-core-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-core-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-disk-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-disk-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-iscsi-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-iscsi-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-logical-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-logical-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-mpath-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-mpath-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-rbd-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-rbd-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-scsi-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-storage-scsi-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-uml-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-uml-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-vbox-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-driver-vbox-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-hooks-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-lxc-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-qemu-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-uml-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-vbox-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-daemon-xen-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-debugsource-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-devel-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-doc-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-libs-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-libs-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-lock-sanlock-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-lock-sanlock-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-nss-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-nss-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm wireshark-plugin-libvirt-4.0.0-lp150.7.3.1.x86_64.rpm wireshark-plugin-libvirt-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-4.0.0-lp150.7.3.1.i586.rpm libvirt-admin-4.0.0-lp150.7.3.1.i586.rpm libvirt-admin-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-client-32bit-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-client-4.0.0-lp150.7.3.1.i586.rpm libvirt-client-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-config-network-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-config-nwfilter-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-interface-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-interface-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-lxc-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-lxc-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-network-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-network-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-nodedev-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-nodedev-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-nwfilter-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-nwfilter-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-qemu-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-qemu-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-secret-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-secret-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-core-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-core-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-disk-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-disk-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-iscsi-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-iscsi-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-logical-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-logical-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-mpath-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-mpath-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-scsi-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-storage-scsi-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-uml-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-uml-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-vbox-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-driver-vbox-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-hooks-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-lxc-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-qemu-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-uml-4.0.0-lp150.7.3.1.i586.rpm libvirt-daemon-vbox-4.0.0-lp150.7.3.1.i586.rpm libvirt-debugsource-4.0.0-lp150.7.3.1.i586.rpm libvirt-devel-32bit-4.0.0-lp150.7.3.1.x86_64.rpm libvirt-devel-4.0.0-lp150.7.3.1.i586.rpm libvirt-doc-4.0.0-lp150.7.3.1.i586.rpm libvirt-libs-4.0.0-lp150.7.3.1.i586.rpm libvirt-libs-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-lock-sanlock-4.0.0-lp150.7.3.1.i586.rpm libvirt-lock-sanlock-debuginfo-4.0.0-lp150.7.3.1.i586.rpm libvirt-nss-4.0.0-lp150.7.3.1.i586.rpm libvirt-nss-debuginfo-4.0.0-lp150.7.3.1.i586.rpm wireshark-plugin-libvirt-4.0.0-lp150.7.3.1.i586.rpm wireshark-plugin-libvirt-debuginfo-4.0.0-lp150.7.3.1.i586.rpm openSUSE-2018-568 Recommended update for patch low openSUSE Leap 15.0 Update This update for patch fixes the following issue: - Fixed a temporary file leak when applying ed-style patches (boo#1092500). patch-2.7.6-lp150.3.3.1.src.rpm patch-2.7.6-lp150.3.3.1.x86_64.rpm patch-debuginfo-2.7.6-lp150.3.3.1.x86_64.rpm patch-debugsource-2.7.6-lp150.3.3.1.x86_64.rpm patch-2.7.6-lp150.3.3.1.i586.rpm patch-debuginfo-2.7.6-lp150.3.3.1.i586.rpm patch-debugsource-2.7.6-lp150.3.3.1.i586.rpm openSUSE-2018-603 Security update for qemu important openSUSE Leap 15.0 Update This update for qemu fixes the following issues: This security issue was fixed: - CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885). Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This patch permits the new x86 cpu feature flag named "ssbd" to be presented to the guest, given that the host has this feature, and KVM exposes it to the guest as well. For this feature to be enabled please use the qemu commandline -cpu $MODEL,+spec-ctrl,+ssbd so the guest OS can take advantage of the feature. spec-ctrl and ssbd support is also required in the host. This non-security issue was fixed: - Fix qemu-guest-agent uninstall (boo#1093169) qemu-linux-user-2.11.1-lp150.7.3.1.src.rpm qemu-linux-user-2.11.1-lp150.7.3.1.x86_64.rpm qemu-linux-user-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-linux-user-debugsource-2.11.1-lp150.7.3.1.x86_64.rpm qemu-testsuite-2.11.1-lp150.7.3.1.src.rpm qemu-testsuite-2.11.1-lp150.7.3.1.x86_64.rpm qemu-2.11.1-lp150.7.3.1.src.rpm qemu-2.11.1-lp150.7.3.1.x86_64.rpm qemu-arm-2.11.1-lp150.7.3.1.x86_64.rpm qemu-arm-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-curl-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-curl-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-dmg-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-dmg-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-gluster-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-gluster-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-iscsi-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-iscsi-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-rbd-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-rbd-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-ssh-2.11.1-lp150.7.3.1.x86_64.rpm qemu-block-ssh-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-debugsource-2.11.1-lp150.7.3.1.x86_64.rpm qemu-extra-2.11.1-lp150.7.3.1.x86_64.rpm qemu-extra-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-guest-agent-2.11.1-lp150.7.3.1.x86_64.rpm qemu-guest-agent-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-ipxe-1.0.0-lp150.7.3.1.noarch.rpm qemu-ksm-2.11.1-lp150.7.3.1.x86_64.rpm qemu-kvm-2.11.1-lp150.7.3.1.x86_64.rpm qemu-lang-2.11.1-lp150.7.3.1.x86_64.rpm qemu-ppc-2.11.1-lp150.7.3.1.x86_64.rpm qemu-ppc-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-s390-2.11.1-lp150.7.3.1.x86_64.rpm qemu-s390-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-seabios-1.11.0-lp150.7.3.1.noarch.rpm qemu-sgabios-8-lp150.7.3.1.noarch.rpm qemu-tools-2.11.1-lp150.7.3.1.x86_64.rpm qemu-tools-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm qemu-vgabios-1.11.0-lp150.7.3.1.noarch.rpm qemu-x86-2.11.1-lp150.7.3.1.x86_64.rpm qemu-x86-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm openSUSE-2018-572 Security update for mariadb moderate openSUSE Leap 15.0 Update This update for mariadb to version 10.2.15 fixes the following issues: These security issues were fixed: - CVE-2018-2767: Enforse use of SSL/TLS in embedded server library (Return of BACKRONYM) (bsc#1088681). - CVE-2018-2786: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data (bsc#1089987). - CVE-2018-2759: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987). - CVE-2018-2777: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987). - CVE-2018-2810: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987). - CVE-2018-2782: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987, bsc#1090518). - CVE-2018-2784: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987, bsc#1090518). - CVE-2018-2787: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data (bsc#1089987, bsc#1090518). - CVE-2018-2766: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987, bsc#1090518). - CVE-2018-2755: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Difficult to exploit vulnerability allowed unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server (bsc#1089987, bsc#1090518). - CVE-2018-2819: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987, bsc#1090518). - CVE-2018-2817: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987, bsc#1090518). - CVE-2018-2761: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Difficult to exploit vulnerability allowed unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987, bsc#1090518). - CVE-2018-2781: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Easily exploitable vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987, bsc#1090518). - CVE-2018-2771: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Difficult to exploit vulnerability allowed high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server (bsc#1089987, bsc#1090518). - CVE-2018-2813: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Easily exploitable vulnerability allowed low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data (bsc#1089987, bsc#1090518). These non-security issues were fixed: - PCRE updated to 8.42 - Incomplete validation of missing tablespace during recovery - ib_buffer_pool unnecessarily includes the temporary tablespace - InnoDB may write uninitialized garbage to redo log - Virtual Columns: Assertion failed in dict_table_get_col_name - slow innodb startup/shutdown can exceed systemd timeout - Assertion failed in dict_check_sys_tables on upgrade from 5.5 - Change buffer crash during TRUNCATE or DROP TABLE - temporary table ROLLBACK fixes For additional details please see - https://mariadb.com/kb/en/library/mariadb-10215-release-notes - https://mariadb.com/kb/en/library/mariadb-10215-changelog libmysqld-devel-10.2.15-lp150.2.3.2.x86_64.rpm libmysqld19-10.2.15-lp150.2.3.2.x86_64.rpm libmysqld19-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-10.2.15-lp150.2.3.2.src.rpm mariadb-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-bench-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-bench-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-client-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-client-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-debugsource-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-errormessages-10.2.15-lp150.2.3.2.noarch.rpm mariadb-galera-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-test-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-test-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-tools-10.2.15-lp150.2.3.2.x86_64.rpm mariadb-tools-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm libmysqld-devel-10.2.15-lp150.2.3.2.i586.rpm libmysqld19-10.2.15-lp150.2.3.2.i586.rpm libmysqld19-debuginfo-10.2.15-lp150.2.3.2.i586.rpm mariadb-10.2.15-lp150.2.3.2.i586.rpm mariadb-bench-10.2.15-lp150.2.3.2.i586.rpm mariadb-bench-debuginfo-10.2.15-lp150.2.3.2.i586.rpm mariadb-client-10.2.15-lp150.2.3.2.i586.rpm mariadb-client-debuginfo-10.2.15-lp150.2.3.2.i586.rpm mariadb-debuginfo-10.2.15-lp150.2.3.2.i586.rpm mariadb-debugsource-10.2.15-lp150.2.3.2.i586.rpm mariadb-galera-10.2.15-lp150.2.3.2.i586.rpm mariadb-test-10.2.15-lp150.2.3.2.i586.rpm mariadb-test-debuginfo-10.2.15-lp150.2.3.2.i586.rpm mariadb-tools-10.2.15-lp150.2.3.2.i586.rpm mariadb-tools-debuginfo-10.2.15-lp150.2.3.2.i586.rpm openSUSE-2018-577 Recommended update for yast2-storage-ng low openSUSE Leap 15.0 Update This update for yast2-storage-ng fixes the following issues: - Partitioner: Fixed an error when creating new BTRFS subvolumes in an installed system (boo#1067510) - Partitioner: Handle limitations for volume labels (boo#1084867) - Partitioner: Allow to move partitions (part of fate#318196) yast2-storage-ng-4.0.186-lp150.2.6.1.src.rpm yast2-storage-ng-4.0.186-lp150.2.6.1.x86_64.rpm yast2-storage-ng-4.0.186-lp150.2.6.1.i586.rpm openSUSE-2018-592 Security update for mupdf moderate openSUSE Leap 15.0 Update This update for mupdf fixes the following security issue: - CVE-2018-1000051: Prevent use after free in fz_keep_key_storable that can result in DOS / possible code execution. This attack appear to be exploitable via Victim opens a specially crafted PDF (bsc#1080531). mupdf-1.12.0-lp150.3.3.1.src.rpm mupdf-1.12.0-lp150.3.3.1.x86_64.rpm mupdf-debuginfo-1.12.0-lp150.3.3.1.x86_64.rpm mupdf-debugsource-1.12.0-lp150.3.3.1.x86_64.rpm mupdf-devel-static-1.12.0-lp150.3.3.1.x86_64.rpm mupdf-1.12.0-lp150.3.3.1.i586.rpm mupdf-debuginfo-1.12.0-lp150.3.3.1.i586.rpm mupdf-debugsource-1.12.0-lp150.3.3.1.i586.rpm mupdf-devel-static-1.12.0-lp150.3.3.1.i586.rpm openSUSE-2018-578 Recommended update for autoyast2 low openSUSE Leap 15.0 Update This update for autoyast2 fixes the following issues: - Partition configuration: Do not ask for saving values if they have not been changed at all. (boo#1082556) - Using new libstorage-ng in order to handle "label" tag in URL. E.G.: autoyast=label://my_home//autoinst.xml (boo#1094533) autoyast2-4.0.55-lp150.2.3.1.noarch.rpm autoyast2-4.0.55-lp150.2.3.1.src.rpm autoyast2-installation-4.0.55-lp150.2.3.1.noarch.rpm openSUSE-2018-604 Recommended update for guix moderate openSUSE Leap 15.0 Update This update for guix fixes the following issues: - Bugfix: package fetching via https was not possible (boo#1095970) guix-0.14.0-lp150.2.3.1.src.rpm guix-0.14.0-lp150.2.3.1.x86_64.rpm guix-debuginfo-0.14.0-lp150.2.3.1.x86_64.rpm guix-debugsource-0.14.0-lp150.2.3.1.x86_64.rpm openSUSE-2018-627 Security update for taglib low openSUSE Leap 15.0 Update This update for taglib fixes this security issues: - CVE-2018-11439: The TagLib::Ogg::FLAC::File::scan function allowed remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file (bsc#1096180). libtag-devel-1.11.1-lp150.3.3.1.x86_64.rpm libtag1-1.11.1-lp150.3.3.1.x86_64.rpm libtag1-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm libtag_c0-1.11.1-lp150.3.3.1.x86_64.rpm libtag_c0-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm taglib-1.11.1-lp150.3.3.1.src.rpm taglib-1.11.1-lp150.3.3.1.x86_64.rpm taglib-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm taglib-debugsource-1.11.1-lp150.3.3.1.x86_64.rpm libtag-devel-1.11.1-lp150.3.3.1.i586.rpm libtag1-1.11.1-lp150.3.3.1.i586.rpm libtag1-32bit-1.11.1-lp150.3.3.1.x86_64.rpm libtag1-32bit-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm libtag1-debuginfo-1.11.1-lp150.3.3.1.i586.rpm libtag_c0-1.11.1-lp150.3.3.1.i586.rpm libtag_c0-32bit-1.11.1-lp150.3.3.1.x86_64.rpm libtag_c0-32bit-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm libtag_c0-debuginfo-1.11.1-lp150.3.3.1.i586.rpm taglib-1.11.1-lp150.3.3.1.i586.rpm taglib-debuginfo-1.11.1-lp150.3.3.1.i586.rpm taglib-debugsource-1.11.1-lp150.3.3.1.i586.rpm openSUSE-2018-579 Optional update to add pam_ldap moderate openSUSE Leap 15.0 Update This optional update adds pam_ldap to the distribution. The pam_ldap is required for LDAP configuration in YaST2. (boo#1096173) pam_ldap-186-lp150.2.1.src.rpm pam_ldap-186-lp150.2.1.x86_64.rpm pam_ldap-debuginfo-186-lp150.2.1.x86_64.rpm pam_ldap-debugsource-186-lp150.2.1.x86_64.rpm openSUSE-2018-581 Recommended update for yast2 moderate openSUSE Leap 15.0 Update This update for yast2 fixes the following issues: - Display proper release notes for product (bsc#1096138) - Rename SLES_HPC to SLE_HPC (bsc#1095053) - Calling YAST module: Do not create a post Snapper image if the pre Snapper image has already been failed (bsc#1093374) yast2-4.0.77-lp150.2.3.1.src.rpm yast2-4.0.77-lp150.2.3.1.x86_64.rpm yast2-4.0.77-lp150.2.3.1.i586.rpm openSUSE-2018-589 Security update for curl moderate openSUSE Leap 15.0 Update This update for curl to version 7.60.0 fixes the following issues: These security issues were fixed: - CVE-2018-1000300: Prevent heap-based buffer overflow when closing down an FTP connection with very long server command replies (bsc#1092094). - CVE-2018-1000301: Prevent buffer over-read that could have cause reading data beyond the end of a heap based buffer used to store downloaded RTSP content (bsc#1092098). These non-security issues were fixed: - Add CURLOPT_HAPROXYPROTOCOL, support for the HAProxy PROXY protocol - Add --haproxy-protocol for the command line tool - Add CURLOPT_DNS_SHUFFLE_ADDRESSES, shuffle returned IP addresses - FTP: fix typo in recursive callback detection for seeking - test1208: marked flaky - HTTP: make header-less responses still count correct body size - user-agent.d:: mention --proxy-header as well - http2: fixes typo - cleanup: misc typos in strings and comments - rate-limit: use three second window to better handle high speeds - examples/hiperfifo.c: improved - pause: when changing pause state, update socket state - curl_version_info.3: fix ssl_version description - add_handle/easy_perform: clear errorbuffer on start if set - cmake: add support for brotli - parsedate: support UT timezone - vauth/ntlm.h: fix the #ifdef header guard - lib/curl_path.h: added #ifdef header guard - vauth/cleartext: fix integer overflow check - CURLINFO_COOKIELIST.3: made the example not leak memory - cookie.d: mention that "-" as filename means stdin - CURLINFO_SSL_VERIFYRESULT.3: fixed the example - http2: read pending frames (including GOAWAY) in connection-check - timeval: remove compilation warning by casting - cmake: avoid warn-as-error during config checks - travis-ci: enable -Werror for CMake builds - openldap: fix for NULL return from ldap_get_attribute_ber() - threaded resolver: track resolver time and set suitable timeout values - cmake: Add advapi32 as explicit link library for win32 - docs: fix CURLINFO_*_T examples use of CURL_FORMAT_CURL_OFF_T - test1148: set a fixed locale for the test - cookies: when reading from a file, only remove_expired once - cookie: store cookies per top-level-domain-specific hash table - openssl: RESTORED verify locations when verifypeer==0 - file: restore old behavior for file:////foo/bar URLs - FTP: allow PASV on IPv6 connections when a proxy is being used - build-openssl.bat: allow custom paths for VS and perl - winbuild: make the clean target work without build-type - build-openssl.bat: Refer to VS2017 as VC14.1 instead of VC15 - curl: retry on FTP 4xx, ignore other protocols - configure: detect (and use) sa_family_t - examples/sftpuploadresume: Fix Windows large file seek - build: cleanup to fix clang warnings/errors - winbuild: updated the documentation - lib: silence null-dereference warnings - travis: bump to clang 6 and gcc 7 - travis: build libpsl and make builds use it - proxy: show getenv proxy use in verbose output - duphandle: make sure CURLOPT_RESOLVE is duplicated - all: Refactor malloc+memset to use calloc - checksrc: Fix typo - system.h: Add sparcv8plus to oracle/sunpro 32-bit detection - vauth: Fix typo - ssh: show libSSH2 error code when closing fails - test1148: tolerate progress updates better - urldata: make service names unconditional - configure: keep LD_LIBRARY_PATH changes local - ntlm_sspi: fix authentication using Credential Manager - schannel: add client certificate authentication - winbuild: Support custom devel paths for each dependency - schannel: add support for CURLOPT_CAINFO - http2: handle on_begin_headers() called more than once - openssl: support OpenSSL 1.1.1 verbose-mode trace messages - openssl: fix subjectAltName check on non-ASCII platforms - http2: avoid strstr() on data not zero terminated - http2: clear the "drain counter" when a stream is closed - http2: handle GOAWAY properly - tool_help: clarify --max-time unit of time is seconds - curl.1: clarify that options and URLs can be mixed - http2: convert an assert to run-time check - curl_global_sslset: always provide available backends - ftplistparser: keep state between invokes - Curl_memchr: zero length input can't match - examples/sftpuploadresume: typecast fseek argument to long - examples/http2-upload: expand buffer to avoid silly warning - ctype: restore character classification for non-ASCII platforms - mime: avoid NULL pointer dereference risk - cookies: ensure that we have cookies before writing jar - os400.c: fix checksrc warnings - configure: provide --with-wolfssl as an alias for --with-cyassl - cyassl: adapt to libraries without TLS 1.0 support built-in - http2: get rid of another strstr - checksrc: force indentation of lines after an else - cookies: remove unused macro - CURLINFO_PROTOCOL.3: mention the existing defined names - tests: provide 'manual' as a feature to optionally require - travis: enable libssh2 on both macos and Linux - CURLOPT_URL.3: added ENCODING section - wolfssl: Fix non-blocking connect - vtls: don't define MD5_DIGEST_LENGTH for wolfssl - docs: remove extraneous commas in man pages - URL: fix ASCII dependency in strcpy_url and strlen_url - ssh-libssh.c: fix left shift compiler warning - configure: only check for CA bundle for file-using SSL backends - travis: add an mbedtls build - http: don't set the "rewind" flag when not uploading anything - configure: put CURLDEBUG and DEBUGBUILD in lib/curl_config.h - transfer: don't unset writesockfd on setup of multiplexed conns - vtls: use unified "supports" bitfield member in backends - URLs: fix one more http url - travis: add a build using WolfSSL - openssl: change FILE ops to BIO ops - travis: add build using NSS - smb: reject negative file sizes - cookies: accept parameter names as cookie name - http2: getsock fix for uploads - all over: fixed format specifiers - http2: use the correct function pointer typedef curl-mini-7.60.0-lp150.2.3.1.src.rpm curl-mini-7.60.0-lp150.2.3.1.x86_64.rpm curl-mini-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm curl-mini-debugsource-7.60.0-lp150.2.3.1.x86_64.rpm libcurl-mini-devel-7.60.0-lp150.2.3.1.x86_64.rpm libcurl4-mini-7.60.0-lp150.2.3.1.x86_64.rpm libcurl4-mini-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm curl-7.60.0-lp150.2.3.1.src.rpm curl-7.60.0-lp150.2.3.1.x86_64.rpm curl-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm curl-debugsource-7.60.0-lp150.2.3.1.x86_64.rpm libcurl-devel-7.60.0-lp150.2.3.1.x86_64.rpm libcurl4-7.60.0-lp150.2.3.1.x86_64.rpm libcurl4-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm curl-mini-7.60.0-lp150.2.3.1.i586.rpm curl-mini-debuginfo-7.60.0-lp150.2.3.1.i586.rpm curl-mini-debugsource-7.60.0-lp150.2.3.1.i586.rpm libcurl-mini-devel-7.60.0-lp150.2.3.1.i586.rpm libcurl4-mini-7.60.0-lp150.2.3.1.i586.rpm libcurl4-mini-debuginfo-7.60.0-lp150.2.3.1.i586.rpm curl-7.60.0-lp150.2.3.1.i586.rpm curl-debuginfo-7.60.0-lp150.2.3.1.i586.rpm curl-debugsource-7.60.0-lp150.2.3.1.i586.rpm libcurl-devel-32bit-7.60.0-lp150.2.3.1.x86_64.rpm libcurl-devel-7.60.0-lp150.2.3.1.i586.rpm libcurl4-32bit-7.60.0-lp150.2.3.1.x86_64.rpm libcurl4-32bit-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm libcurl4-7.60.0-lp150.2.3.1.i586.rpm libcurl4-debuginfo-7.60.0-lp150.2.3.1.i586.rpm openSUSE-2018-629 Security update for opencv moderate openSUSE Leap 15.0 Update This update for opencv fixes this security issue: - CVE-2017-18009: Prevent heap-based buffer over-read in the function cv::HdrDecoder::checkSignature (bsc#1074312). libopencv3_3-3.3.1-lp150.4.3.1.x86_64.rpm libopencv3_3-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm opencv-3.3.1-lp150.4.3.1.src.rpm opencv-3.3.1-lp150.4.3.1.x86_64.rpm opencv-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm opencv-debugsource-3.3.1-lp150.4.3.1.x86_64.rpm opencv-devel-3.3.1-lp150.4.3.1.x86_64.rpm opencv-doc-3.3.1-lp150.4.3.1.x86_64.rpm python2-opencv-3.3.1-lp150.4.3.1.x86_64.rpm python2-opencv-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm python3-opencv-3.3.1-lp150.4.3.1.x86_64.rpm python3-opencv-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm openSUSE-2018-585 Recommended update for biosdevname moderate openSUSE Leap 15.0 Update This update for biosdevname fixes the following issues: - biosdevname could crash due to an infinite recursion (boo#1093625) biosdevname-0.7.3-lp150.3.3.1.src.rpm biosdevname-0.7.3-lp150.3.3.1.x86_64.rpm biosdevname-debuginfo-0.7.3-lp150.3.3.1.x86_64.rpm biosdevname-debugsource-0.7.3-lp150.3.3.1.x86_64.rpm biosdevname-0.7.3-lp150.3.3.1.i586.rpm biosdevname-debuginfo-0.7.3-lp150.3.3.1.i586.rpm biosdevname-debugsource-0.7.3-lp150.3.3.1.i586.rpm openSUSE-2018-583 Recommended update for cloud-init moderate openSUSE Leap 15.0 Update This update for cloud-init fixes the following issues: - cloud-init may have reported "no datasource found (boo#1089824, boo#1093501) This bugfix is an improvement on a previous change. cloud-init-18.2-lp150.2.6.1.src.rpm cloud-init-18.2-lp150.2.6.1.x86_64.rpm cloud-init-config-suse-18.2-lp150.2.6.1.x86_64.rpm cloud-init-doc-18.2-lp150.2.6.1.x86_64.rpm openSUSE-2018-587 Recommended update for crmsh moderate openSUSE Leap 15.0 Update This update for crmsh fixes the following issues: - bash_completion: non-interactive mode completer did not work (boo#1090304) - terminal could have lost cursor after typing ctrl+c (boo#1090626) - Wrong prompt string after poped help messages when input at a new line (boo#1090140) - Documentation formatting issue (boo#1075764) crmsh-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.noarch.rpm crmsh-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.src.rpm crmsh-scripts-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.noarch.rpm crmsh-test-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.noarch.rpm openSUSE-2018-588 Recommended update for filesystem moderate openSUSE Leap 15.0 Update This update for filesystem fixes the following issues: - possible shutdown issues after upgrading from an older release (boo#1084119) filesystem-15.0-lp150.8.3.1.src.rpm filesystem-15.0-lp150.8.3.1.x86_64.rpm filesystem-15.0-lp150.8.3.1.i586.rpm openSUSE-2018-584 Recommended update for google-compute-engine important openSUSE Leap 15.0 Update This update for google-compute-engine fixes the following issues: - Instance initialization failed due to an incompatibility with Python 3 (boo#1094074) google-compute-engine-20180510-lp150.2.6.1.src.rpm google-compute-engine-init-20180510-lp150.2.6.1.noarch.rpm google-compute-engine-oslogin-20180510-lp150.2.6.1.x86_64.rpm google-compute-engine-oslogin-debuginfo-20180510-lp150.2.6.1.x86_64.rpm google-compute-engine-oslogin-20180510-lp150.2.6.1.i586.rpm google-compute-engine-oslogin-32bit-20180510-lp150.2.6.1.x86_64.rpm google-compute-engine-oslogin-32bit-debuginfo-20180510-lp150.2.6.1.x86_64.rpm google-compute-engine-oslogin-debuginfo-20180510-lp150.2.6.1.i586.rpm openSUSE-2018-575 Security update for MozillaFirefox, mozilla-nss important openSUSE Leap 15.0 Update This update for MozillaFirefox, mozilla-nss fixes the following issues: Security issue fixed in Mozilla Firefox 60.0.2 ESR: - CVE-2018-6126: Heap buffer overflow rasterizing paths in SVG with Skia (MFSA 2018-14, boo#1096449) The following bugs were fixed: - In KDE Open with option in download dialog has no effect with kmozillahelper (boo#1094747) - Startup crashes on aarch64 (boo#1093059) Mozilla Firefox now requires NSS 3.36.4 (boo#1096515). The following changes are included in NSS: - Fix issues connecting to servers recently upgraded to TLS 1.3 (SSL_RX_MALFORMED_SERVER_HELLO error) - Fix a rare bug with PKCS#12 files - Apply additional harding (relro linker option) MozillaFirefox-60.0.2-lp150.3.6.1.src.rpm MozillaFirefox-60.0.2-lp150.3.6.1.x86_64.rpm MozillaFirefox-branding-upstream-60.0.2-lp150.3.6.1.x86_64.rpm MozillaFirefox-buildsymbols-60.0.2-lp150.3.6.1.x86_64.rpm MozillaFirefox-debuginfo-60.0.2-lp150.3.6.1.x86_64.rpm MozillaFirefox-debugsource-60.0.2-lp150.3.6.1.x86_64.rpm MozillaFirefox-devel-60.0.2-lp150.3.6.1.x86_64.rpm MozillaFirefox-translations-common-60.0.2-lp150.3.6.1.x86_64.rpm MozillaFirefox-translations-other-60.0.2-lp150.3.6.1.x86_64.rpm libfreebl3-3.36.4-lp150.2.3.1.x86_64.rpm libfreebl3-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm libsoftokn3-3.36.4-lp150.2.3.1.x86_64.rpm libsoftokn3-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-3.36.4-lp150.2.3.1.src.rpm mozilla-nss-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-certs-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-certs-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-debugsource-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-devel-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-sysinit-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-sysinit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-tools-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-tools-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm libfreebl3-3.36.4-lp150.2.3.1.i586.rpm libfreebl3-32bit-3.36.4-lp150.2.3.1.x86_64.rpm libfreebl3-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm libfreebl3-debuginfo-3.36.4-lp150.2.3.1.i586.rpm libsoftokn3-3.36.4-lp150.2.3.1.i586.rpm libsoftokn3-32bit-3.36.4-lp150.2.3.1.x86_64.rpm libsoftokn3-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm libsoftokn3-debuginfo-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-32bit-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-certs-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-certs-32bit-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-certs-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-certs-debuginfo-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-debuginfo-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-debugsource-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-devel-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-sysinit-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-sysinit-32bit-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-sysinit-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm mozilla-nss-sysinit-debuginfo-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-tools-3.36.4-lp150.2.3.1.i586.rpm mozilla-nss-tools-debuginfo-3.36.4-lp150.2.3.1.i586.rpm openSUSE-2018-593 Recommended update for yast2-proxy moderate openSUSE Leap 15.0 Update This update for yast2-proxy fixes the following issues: - Clean up of 'No Proxy Domains' field when whitespaces are detected (bsc#1089796) yast2-proxy-4.0.1-lp150.2.3.1.noarch.rpm yast2-proxy-4.0.1-lp150.2.3.1.src.rpm openSUSE-2018-594 Recommended update for yast2-printer moderate openSUSE Leap 15.0 Update This update for yast2-printer fixes the following issues: - Fixed alignment of input fields in "Connection Wizard". (bsc#1091290) yast2-printer-4.0.2-lp150.2.3.1.src.rpm yast2-printer-4.0.2-lp150.2.3.1.x86_64.rpm yast2-printer-debuginfo-4.0.2-lp150.2.3.1.x86_64.rpm yast2-printer-debugsource-4.0.2-lp150.2.3.1.x86_64.rpm yast2-printer-4.0.2-lp150.2.3.1.i586.rpm yast2-printer-debuginfo-4.0.2-lp150.2.3.1.i586.rpm yast2-printer-debugsource-4.0.2-lp150.2.3.1.i586.rpm openSUSE-2018-608 Recommended update for libstorage-ng important openSUSE Leap 15.0 Update This update for libstorage-ng fixes the following issues: - multiple translation updates - YaST error caused when auto-mounting ext4 partition on Xen PV device after FS resize (boo#1073633) - error creating partitions on GPT not using complete disk (boo#1092193) - A message "Probing partitions failed" while Installation could be shown on Power (boo#1095168) - Avoid functional conflicts with libdmraid during upgrade (boo#1088570) - issues probing storage of certain nvme systems (boo#1093684) libstorage-ng-3.3.300-lp150.2.3.2.src.rpm libstorage-ng-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-debugsource-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-devel-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-integration-tests-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-lang-3.3.300-lp150.2.3.2.noarch.rpm libstorage-ng-python3-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-python3-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-ruby-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-ruby-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-utils-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-utils-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng1-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng1-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm libstorage-ng-debuginfo-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng-debugsource-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng-devel-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng-integration-tests-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng-python3-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng-python3-debuginfo-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng-ruby-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng-ruby-debuginfo-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng-utils-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng-utils-debuginfo-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng1-3.3.300-lp150.2.3.2.i586.rpm libstorage-ng1-debuginfo-3.3.300-lp150.2.3.2.i586.rpm openSUSE-2018-595 Recommended update for yast2-pkg-bindings-devel-doc moderate openSUSE Leap 15.0 Update This update for yast2-pkg-bindings-devel-doc fixes the following issues: - Bugfix: Do not reset the source manager if also the options are the same as the ones used previously (bsc#1095702) yast2-pkg-bindings-devel-doc-4.0.11-lp150.2.6.1.noarch.rpm yast2-pkg-bindings-devel-doc-4.0.11-lp150.2.6.1.src.rpm yast2-pkg-bindings-4.0.11-lp150.2.6.1.src.rpm yast2-pkg-bindings-4.0.11-lp150.2.6.1.x86_64.rpm yast2-pkg-bindings-debuginfo-4.0.11-lp150.2.6.1.x86_64.rpm yast2-pkg-bindings-debugsource-4.0.11-lp150.2.6.1.x86_64.rpm yast2-pkg-bindings-4.0.11-lp150.2.6.1.i586.rpm yast2-pkg-bindings-debuginfo-4.0.11-lp150.2.6.1.i586.rpm yast2-pkg-bindings-debugsource-4.0.11-lp150.2.6.1.i586.rpm openSUSE-2018-606 Recommended update for ibmtss moderate openSUSE Leap 15.0 Update This update for ibmtss fixes the following issues: - the ibmtss utility was missing the libtss.so.0 library (boo#1093612) ibmtss-1045-lp150.3.3.1.src.rpm ibmtss-1045-lp150.3.3.1.x86_64.rpm ibmtss-base-1045-lp150.3.3.1.noarch.rpm ibmtss-debuginfo-1045-lp150.3.3.1.x86_64.rpm ibmtss-debugsource-1045-lp150.3.3.1.x86_64.rpm ibmtss-devel-1045-lp150.3.3.1.x86_64.rpm libtss0-1045-lp150.3.3.1.x86_64.rpm libtss0-debuginfo-1045-lp150.3.3.1.x86_64.rpm openSUSE-2018-605 Recommended update for cargo low openSUSE Leap 15.0 Update This update for cargo contains the following change: - cargo 0.26.0 is provided as imported from the SLE 15 codebase (boo#1096770) - No longer removes rust or rs prefixs/suffixs. - Now defaults to creating a binary crate, instead of a library crate cargo-0.26.0-lp150.2.3.4.src.rpm cargo-0.26.0-lp150.2.3.4.x86_64.rpm cargo-debuginfo-0.26.0-lp150.2.3.4.x86_64.rpm cargo-0.26.0-lp150.2.3.4.i686.rpm cargo-debuginfo-0.26.0-lp150.2.3.4.i686.rpm openSUSE-2018-611 Recommended update for hyper-v moderate openSUSE Leap 15.0 Update This update for hyper-v fixes the following issues: - Running lsvmbus may have failed due to an incorrect interpreter string (boo#1093910) hyper-v-7-lp150.4.3.2.src.rpm hyper-v-7-lp150.4.3.2.x86_64.rpm hyper-v-debuginfo-7-lp150.4.3.2.x86_64.rpm hyper-v-debugsource-7-lp150.4.3.2.x86_64.rpm hyper-v-7-lp150.4.3.2.i586.rpm hyper-v-debuginfo-7-lp150.4.3.2.i586.rpm hyper-v-debugsource-7-lp150.4.3.2.i586.rpm openSUSE-2018-607 Recommended update for issue-generator moderate openSUSE Leap 15.0 Update This update for issue-generator fixes the following issues: - Permission issue on /run/issue which was root readable only (boo#1095697) issue-generator-1.6-lp150.3.6.2.noarch.rpm issue-generator-1.6-lp150.3.6.2.src.rpm openSUSE-2018-609 Recommended update for sysconfig moderate openSUSE Leap 15.0 Update This update for sysconfig fixes the following issues: - When using NetworkManager but some interfaces are not managed my NetworkManager, such as when using a VPN client directly, the DNS entries were not set correctly (boo#1079793) sysconfig-0.84.3-lp150.3.3.2.src.rpm sysconfig-0.84.3-lp150.3.3.2.x86_64.rpm sysconfig-debuginfo-0.84.3-lp150.3.3.2.x86_64.rpm sysconfig-debugsource-0.84.3-lp150.3.3.2.x86_64.rpm sysconfig-netconfig-0.84.3-lp150.3.3.2.x86_64.rpm sysconfig-0.84.3-lp150.3.3.2.i586.rpm sysconfig-debuginfo-0.84.3-lp150.3.3.2.i586.rpm sysconfig-debugsource-0.84.3-lp150.3.3.2.i586.rpm sysconfig-netconfig-0.84.3-lp150.3.3.2.i586.rpm openSUSE-2018-610 Recommended update for libgphoto2 moderate openSUSE Leap 15.0 Update This update for libgphoto2 fixes the following issues: - Import of Photos from Canon EOS did not work correctly (boo#1091309) libgphoto2-2.5.18-lp150.2.3.1.src.rpm libgphoto2-6-2.5.18-lp150.2.3.1.x86_64.rpm libgphoto2-6-debuginfo-2.5.18-lp150.2.3.1.x86_64.rpm libgphoto2-6-lang-2.5.18-lp150.2.3.1.noarch.rpm libgphoto2-debugsource-2.5.18-lp150.2.3.1.x86_64.rpm libgphoto2-devel-2.5.18-lp150.2.3.1.x86_64.rpm libgphoto2-devel-doc-2.5.18-lp150.2.3.1.x86_64.rpm libgphoto2-doc-2.5.18-lp150.2.3.1.x86_64.rpm libgphoto2-6-2.5.18-lp150.2.3.1.i586.rpm libgphoto2-6-32bit-2.5.18-lp150.2.3.1.x86_64.rpm libgphoto2-6-32bit-debuginfo-2.5.18-lp150.2.3.1.x86_64.rpm libgphoto2-6-debuginfo-2.5.18-lp150.2.3.1.i586.rpm libgphoto2-debugsource-2.5.18-lp150.2.3.1.i586.rpm libgphoto2-devel-2.5.18-lp150.2.3.1.i586.rpm libgphoto2-devel-32bit-2.5.18-lp150.2.3.1.x86_64.rpm libgphoto2-devel-doc-2.5.18-lp150.2.3.1.i586.rpm libgphoto2-doc-2.5.18-lp150.2.3.1.i586.rpm openSUSE-2018-612 Recommended update for hawk2 important openSUSE Leap 15.0 Update This update for hawk2 fixes the following issues: - UI may have reported a lowlevel error on certain errror conditions (boo#1090562) - Editing a resource with a name that contains a dot resulted in a redirection to 404 page (boo#1092108) - Help links seeded adjustment (boo#1089709) - Issues loading history explorer views (boo#1093420) - Primitive resource creation sometimes failed in Hawk (boo#1092122) hawk2-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.src.rpm hawk2-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.x86_64.rpm hawk2-debuginfo-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.x86_64.rpm hawk2-debugsource-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.x86_64.rpm openSUSE-2018-631 Recommended update for installation-images moderate openSUSE Leap 15.0 Update This update for installation-images fixes the following issues: - The installer dit not detext an existing ReiserFS system (fate#323394) install-initrd-openSUSE-14.373-lp150.2.3.2.x86_64.rpm installation-images-debuginfodeps-openSUSE-14.373-lp150.2.3.2.x86_64.rpm skelcd-installer-net-openSUSE-14.373-lp150.2.3.2.x86_64.rpm skelcd-installer-openSUSE-14.373-lp150.2.3.2.x86_64.rpm tftpboot-installation-openSUSE-Leap-15.0-x86_64-14.373-lp150.2.3.2.noarch.rpm openSUSE-2018-613 Recommended update for tmon moderate openSUSE Leap 15.0 Update This update for tmon fixes the following issues: - race condition related to "cur_thermal_record" caused segmentation faults (boo#1075156) tmon-1.0-lp150.2.3.1.src.rpm tmon-1.0-lp150.2.3.1.x86_64.rpm tmon-debuginfo-1.0-lp150.2.3.1.x86_64.rpm tmon-debugsource-1.0-lp150.2.3.1.x86_64.rpm openSUSE-2018-615 Recommended update for rmt-server, yast2-rmt moderate openSUSE Leap 15.0 Update This update contains the final releases for rmt-server and yast2-rmt (boo#1093879) This updates contains various code and packaging fixes as released for SLE 15. rmt-server is a Repository mirroring tool and registration proxy for SCC. yast2-rmt is a YaST module for configuring it. rmt-server-1.0.0-lp150.2.3.2.src.rpm rmt-server-1.0.0-lp150.2.3.2.x86_64.rpm rmt-server-debuginfo-1.0.0-lp150.2.3.2.x86_64.rpm yast2-rmt-1.0.0-lp150.2.3.2.noarch.rpm yast2-rmt-1.0.0-lp150.2.3.2.src.rpm openSUSE-2018-652 Security update for aubio low openSUSE Leap 15.0 Update This update for aubio fixes the following security issue: - CVE-2017-17554: Prevent NULL pointer dereference in the function aubio_source_avcodec_readframe which may have lead to DoS when playing a crafted audio file (bsc#1072317). aubio-0.4.6-lp150.3.3.1.src.rpm aubio-debugsource-0.4.6-lp150.3.3.1.x86_64.rpm aubio-tools-0.4.6-lp150.3.3.1.x86_64.rpm aubio-tools-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm libaubio-devel-0.4.6-lp150.3.3.1.x86_64.rpm libaubio5-0.4.6-lp150.3.3.1.x86_64.rpm libaubio5-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm python-aubio-0.4.6-lp150.3.3.1.src.rpm python-aubio-debugsource-0.4.6-lp150.3.3.1.x86_64.rpm python2-aubio-0.4.6-lp150.3.3.1.x86_64.rpm python2-aubio-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm python3-aubio-0.4.6-lp150.3.3.1.x86_64.rpm python3-aubio-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm aubio-debugsource-0.4.6-lp150.3.3.1.i586.rpm aubio-tools-0.4.6-lp150.3.3.1.i586.rpm aubio-tools-debuginfo-0.4.6-lp150.3.3.1.i586.rpm libaubio-devel-0.4.6-lp150.3.3.1.i586.rpm libaubio5-0.4.6-lp150.3.3.1.i586.rpm libaubio5-32bit-0.4.6-lp150.3.3.1.x86_64.rpm libaubio5-32bit-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm libaubio5-debuginfo-0.4.6-lp150.3.3.1.i586.rpm openSUSE-2018-622 Recommended update for yast2-packager moderate openSUSE Leap 15.0 Update This update for yast2-packager fixes the following issues: - When running the installation in textmode, consider only the preselected language when showing the license for extensions, modules or add-ons (boo#1094793). - During an upgrade, skip the base produce license dialog when the same license was already accepted (boo#1080450) - Renaming of SLES_HPC to SLE_HPC (boo#1095053) - Display an error popup when the FIPS compliant mode is active and the "fips" pattern is not available (boo#1093060) yast2-packager-4.0.67-lp150.2.6.2.src.rpm yast2-packager-4.0.67-lp150.2.6.2.x86_64.rpm yast2-packager-4.0.67-lp150.2.6.2.i586.rpm openSUSE-2018-660 Recommended update for gnuhealth, tryton, trytond moderate openSUSE Leap 15.0 Update This update for gnuhealth, tryton, trytond fixes the following issues: - in GNU health, Caldav event did not update after changing the appointmen - trytond: incorrect requirement on postgres96 gnuhealth-3.2.10-lp150.5.3.1.noarch.rpm gnuhealth-3.2.10-lp150.5.3.1.src.rpm tryton-4.2.14-lp150.2.3.1.noarch.rpm tryton-4.2.14-lp150.2.3.1.src.rpm trytond-4.2.12-lp150.2.5.1.noarch.rpm trytond-4.2.12-lp150.2.5.1.src.rpm openSUSE-2018-617 Recommended update for jeos-firstboot moderate openSUSE Leap 15.0 Update This update for jeos-firstboot fixes the following issues: - licenses in non-latin scripts were not displayed incorrectly (boo#1094346) jeos-firstboot-0.0+git20180525.280836a-lp150.2.3.1.noarch.rpm jeos-firstboot-0.0+git20180525.280836a-lp150.2.3.1.src.rpm openSUSE-2018-618 Recommended update for mksusecd moderate openSUSE Leap 15.0 Update This update for mksusecd fixes the following issues: - joliet file names on generated media were too long (boo#1094687) mksusecd-1.59-lp150.2.3.1.src.rpm mksusecd-1.59-lp150.2.3.1.x86_64.rpm mksusecd-debuginfo-1.59-lp150.2.3.1.x86_64.rpm mksusecd-debugsource-1.59-lp150.2.3.1.x86_64.rpm openSUSE-2018-619 Recommended update for patterns-base moderate openSUSE Leap 15.0 Update This update for patterns-base fixes the following issues: - /var/log/messages did not exist because rsyslog was not included in the base pattern (boo#1094841) Rsyslog is now part of the base pattern for logging to go to /var/log/messages as documented. patterns-base-20171206-lp150.15.6.1.src.rpm patterns-base-32bit-20171206-lp150.15.6.1.x86_64.rpm patterns-base-apparmor-20171206-lp150.15.6.1.x86_64.rpm patterns-base-apparmor-32bit-20171206-lp150.15.6.1.x86_64.rpm patterns-base-apparmor_opt-20171206-lp150.15.6.1.x86_64.rpm patterns-base-base-20171206-lp150.15.6.1.x86_64.rpm patterns-base-base-32bit-20171206-lp150.15.6.1.x86_64.rpm patterns-base-basesystem-20171206-lp150.15.6.1.x86_64.rpm patterns-base-console-20171206-lp150.15.6.1.x86_64.rpm patterns-base-documentation-20171206-lp150.15.6.1.x86_64.rpm patterns-base-enhanced_base-20171206-lp150.15.6.1.x86_64.rpm patterns-base-enhanced_base-32bit-20171206-lp150.15.6.1.x86_64.rpm patterns-base-enhanced_base_opt-20171206-lp150.15.6.1.x86_64.rpm patterns-base-minimal_base-20171206-lp150.15.6.1.x86_64.rpm patterns-base-minimal_base-32bit-20171206-lp150.15.6.1.x86_64.rpm patterns-base-sw_management-20171206-lp150.15.6.1.x86_64.rpm patterns-base-sw_management-32bit-20171206-lp150.15.6.1.x86_64.rpm patterns-base-transactional_base-20171206-lp150.15.6.1.x86_64.rpm patterns-base-update_test-20171206-lp150.15.6.1.x86_64.rpm patterns-base-x11-20171206-lp150.15.6.1.x86_64.rpm patterns-base-x11-32bit-20171206-lp150.15.6.1.x86_64.rpm patterns-base-x11_enhanced-20171206-lp150.15.6.1.x86_64.rpm patterns-base-x11_enhanced-32bit-20171206-lp150.15.6.1.x86_64.rpm patterns-base-x11_opt-20171206-lp150.15.6.1.x86_64.rpm openSUSE-2018-620 Recommended update for python-azure-agent moderate openSUSE Leap 15.0 Update This update for python-azure-agent fixes the following issues: - python-azure-agent uses obsolete nettools instead of ip tools (boo#1092831) python-azure-agent-2.2.18-lp150.5.3.1.noarch.rpm python-azure-agent-2.2.18-lp150.5.3.1.src.rpm python-azure-agent-test-2.2.18-lp150.5.3.1.noarch.rpm openSUSE-2018-632 Recommended update for spyder3 low openSUSE Leap 15.0 Update This update for spyder3 fixes the following issues: - spyder3 did not declare the run-time dependency on python3-cloudpickle correctly (boo#1095587) spyder3-3.2.8-lp150.2.3.1.noarch.rpm spyder3-3.2.8-lp150.2.3.1.src.rpm spyder3-breakpoints-3.2.8-lp150.2.3.1.noarch.rpm spyder3-breakpoints-lang-3.2.8-lp150.2.3.1.noarch.rpm spyder3-dicom-3.2.8-lp150.2.3.1.noarch.rpm spyder3-doc-3.2.8-lp150.2.3.1.noarch.rpm spyder3-hdf5-3.2.8-lp150.2.3.1.noarch.rpm spyder3-lang-3.2.8-lp150.2.3.1.noarch.rpm spyder3-profiler-3.2.8-lp150.2.3.1.noarch.rpm spyder3-profiler-lang-3.2.8-lp150.2.3.1.noarch.rpm spyder3-pylint-3.2.8-lp150.2.3.1.noarch.rpm spyder3-pylint-lang-3.2.8-lp150.2.3.1.noarch.rpm openSUSE-2018-621 Recommended update for util-linux moderate openSUSE Leap 15.0 Update This update for util-linux fixes the following issues: - the rfkill-block@.service and rfkill-unblock@service were run in the package pre/postun scripts despite only being templates without parameters (boo#1092820, boo#1093176) python-libmount-2.31.1-lp150.7.3.1.src.rpm python-libmount-2.31.1-lp150.7.3.1.x86_64.rpm python-libmount-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm python-libmount-debugsource-2.31.1-lp150.7.3.1.x86_64.rpm util-linux-systemd-2.31.1-lp150.7.3.1.src.rpm util-linux-systemd-2.31.1-lp150.7.3.1.x86_64.rpm util-linux-systemd-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm util-linux-systemd-debugsource-2.31.1-lp150.7.3.1.x86_64.rpm uuidd-2.31.1-lp150.7.3.1.x86_64.rpm uuidd-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm libblkid-devel-2.31.1-lp150.7.3.1.x86_64.rpm libblkid-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm libblkid1-2.31.1-lp150.7.3.1.x86_64.rpm libblkid1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm libfdisk-devel-2.31.1-lp150.7.3.1.x86_64.rpm libfdisk-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm libfdisk1-2.31.1-lp150.7.3.1.x86_64.rpm libfdisk1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm libmount-devel-2.31.1-lp150.7.3.1.x86_64.rpm libmount-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm libmount1-2.31.1-lp150.7.3.1.x86_64.rpm libmount1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm libsmartcols-devel-2.31.1-lp150.7.3.1.x86_64.rpm libsmartcols-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm libsmartcols1-2.31.1-lp150.7.3.1.x86_64.rpm libsmartcols1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm libuuid-devel-2.31.1-lp150.7.3.1.x86_64.rpm libuuid-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm libuuid1-2.31.1-lp150.7.3.1.x86_64.rpm libuuid1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm util-linux-2.31.1-lp150.7.3.1.src.rpm util-linux-2.31.1-lp150.7.3.1.x86_64.rpm util-linux-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm util-linux-debugsource-2.31.1-lp150.7.3.1.x86_64.rpm util-linux-lang-2.31.1-lp150.7.3.1.noarch.rpm util-linux-systemd-2.31.1-lp150.7.3.1.i586.rpm util-linux-systemd-debuginfo-2.31.1-lp150.7.3.1.i586.rpm util-linux-systemd-debugsource-2.31.1-lp150.7.3.1.i586.rpm uuidd-2.31.1-lp150.7.3.1.i586.rpm uuidd-debuginfo-2.31.1-lp150.7.3.1.i586.rpm libblkid-devel-2.31.1-lp150.7.3.1.i586.rpm libblkid-devel-32bit-2.31.1-lp150.7.3.1.x86_64.rpm libblkid-devel-static-2.31.1-lp150.7.3.1.i586.rpm libblkid1-2.31.1-lp150.7.3.1.i586.rpm libblkid1-32bit-2.31.1-lp150.7.3.1.x86_64.rpm libblkid1-32bit-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm libblkid1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm libfdisk-devel-2.31.1-lp150.7.3.1.i586.rpm libfdisk-devel-static-2.31.1-lp150.7.3.1.i586.rpm libfdisk1-2.31.1-lp150.7.3.1.i586.rpm libfdisk1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm libmount-devel-2.31.1-lp150.7.3.1.i586.rpm libmount-devel-32bit-2.31.1-lp150.7.3.1.x86_64.rpm libmount-devel-static-2.31.1-lp150.7.3.1.i586.rpm libmount1-2.31.1-lp150.7.3.1.i586.rpm libmount1-32bit-2.31.1-lp150.7.3.1.x86_64.rpm libmount1-32bit-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm libmount1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm libsmartcols-devel-2.31.1-lp150.7.3.1.i586.rpm libsmartcols-devel-static-2.31.1-lp150.7.3.1.i586.rpm libsmartcols1-2.31.1-lp150.7.3.1.i586.rpm libsmartcols1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm libuuid-devel-2.31.1-lp150.7.3.1.i586.rpm libuuid-devel-32bit-2.31.1-lp150.7.3.1.x86_64.rpm libuuid-devel-static-2.31.1-lp150.7.3.1.i586.rpm libuuid1-2.31.1-lp150.7.3.1.i586.rpm libuuid1-32bit-2.31.1-lp150.7.3.1.x86_64.rpm libuuid1-32bit-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm libuuid1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm util-linux-2.31.1-lp150.7.3.1.i586.rpm util-linux-debuginfo-2.31.1-lp150.7.3.1.i586.rpm util-linux-debugsource-2.31.1-lp150.7.3.1.i586.rpm openSUSE-2018-624 Recommended update for systemd important openSUSE Leap 15.0 Update This update for systemd fixes the following issues: - Network did not start correctly when installing using a PCI network device (boo#1083158) - User services should not be enabled by default (boo#1090785) - udev: created /dev/disk/by-partlabel/primary and .../logical symlinks as these are contented names (boo#1089761) libsystemd0-mini-234-lp150.20.3.1.x86_64.rpm libsystemd0-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm libudev-mini-devel-234-lp150.20.3.1.x86_64.rpm libudev-mini1-234-lp150.20.3.1.x86_64.rpm libudev-mini1-debuginfo-234-lp150.20.3.1.x86_64.rpm systemd-mini-234-lp150.20.3.1.src.rpm systemd-mini-234-lp150.20.3.1.x86_64.rpm systemd-mini-bash-completion-234-lp150.20.3.1.noarch.rpm systemd-mini-container-mini-234-lp150.20.3.1.x86_64.rpm systemd-mini-container-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm systemd-mini-coredump-mini-234-lp150.20.3.1.x86_64.rpm systemd-mini-coredump-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm systemd-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm systemd-mini-debugsource-234-lp150.20.3.1.x86_64.rpm systemd-mini-devel-234-lp150.20.3.1.x86_64.rpm systemd-mini-sysvinit-234-lp150.20.3.1.x86_64.rpm udev-mini-234-lp150.20.3.1.x86_64.rpm udev-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm libsystemd0-234-lp150.20.3.1.x86_64.rpm libsystemd0-debuginfo-234-lp150.20.3.1.x86_64.rpm libudev-devel-234-lp150.20.3.1.x86_64.rpm libudev1-234-lp150.20.3.1.x86_64.rpm libudev1-debuginfo-234-lp150.20.3.1.x86_64.rpm nss-myhostname-234-lp150.20.3.1.x86_64.rpm nss-myhostname-debuginfo-234-lp150.20.3.1.x86_64.rpm nss-mymachines-234-lp150.20.3.1.x86_64.rpm nss-mymachines-debuginfo-234-lp150.20.3.1.x86_64.rpm nss-systemd-234-lp150.20.3.1.x86_64.rpm nss-systemd-debuginfo-234-lp150.20.3.1.x86_64.rpm systemd-234-lp150.20.3.1.src.rpm systemd-234-lp150.20.3.1.x86_64.rpm systemd-bash-completion-234-lp150.20.3.1.noarch.rpm systemd-container-234-lp150.20.3.1.x86_64.rpm systemd-container-debuginfo-234-lp150.20.3.1.x86_64.rpm systemd-coredump-234-lp150.20.3.1.x86_64.rpm systemd-coredump-debuginfo-234-lp150.20.3.1.x86_64.rpm systemd-debuginfo-234-lp150.20.3.1.x86_64.rpm systemd-debugsource-234-lp150.20.3.1.x86_64.rpm systemd-devel-234-lp150.20.3.1.x86_64.rpm systemd-logger-234-lp150.20.3.1.x86_64.rpm systemd-sysvinit-234-lp150.20.3.1.x86_64.rpm udev-234-lp150.20.3.1.x86_64.rpm udev-debuginfo-234-lp150.20.3.1.x86_64.rpm libsystemd0-mini-234-lp150.20.3.1.i586.rpm libsystemd0-mini-debuginfo-234-lp150.20.3.1.i586.rpm libudev-mini-devel-234-lp150.20.3.1.i586.rpm libudev-mini1-234-lp150.20.3.1.i586.rpm libudev-mini1-debuginfo-234-lp150.20.3.1.i586.rpm systemd-mini-234-lp150.20.3.1.i586.rpm systemd-mini-container-mini-234-lp150.20.3.1.i586.rpm systemd-mini-container-mini-debuginfo-234-lp150.20.3.1.i586.rpm systemd-mini-coredump-mini-234-lp150.20.3.1.i586.rpm systemd-mini-coredump-mini-debuginfo-234-lp150.20.3.1.i586.rpm systemd-mini-debuginfo-234-lp150.20.3.1.i586.rpm systemd-mini-debugsource-234-lp150.20.3.1.i586.rpm systemd-mini-devel-234-lp150.20.3.1.i586.rpm systemd-mini-sysvinit-234-lp150.20.3.1.i586.rpm udev-mini-234-lp150.20.3.1.i586.rpm udev-mini-debuginfo-234-lp150.20.3.1.i586.rpm libsystemd0-234-lp150.20.3.1.i586.rpm libsystemd0-32bit-234-lp150.20.3.1.x86_64.rpm libsystemd0-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm libsystemd0-debuginfo-234-lp150.20.3.1.i586.rpm libudev-devel-234-lp150.20.3.1.i586.rpm libudev-devel-32bit-234-lp150.20.3.1.x86_64.rpm libudev1-234-lp150.20.3.1.i586.rpm libudev1-32bit-234-lp150.20.3.1.x86_64.rpm libudev1-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm libudev1-debuginfo-234-lp150.20.3.1.i586.rpm nss-myhostname-234-lp150.20.3.1.i586.rpm nss-myhostname-32bit-234-lp150.20.3.1.x86_64.rpm nss-myhostname-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm nss-myhostname-debuginfo-234-lp150.20.3.1.i586.rpm nss-mymachines-234-lp150.20.3.1.i586.rpm nss-mymachines-32bit-234-lp150.20.3.1.x86_64.rpm nss-mymachines-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm nss-mymachines-debuginfo-234-lp150.20.3.1.i586.rpm nss-systemd-234-lp150.20.3.1.i586.rpm nss-systemd-debuginfo-234-lp150.20.3.1.i586.rpm systemd-234-lp150.20.3.1.i586.rpm systemd-32bit-234-lp150.20.3.1.x86_64.rpm systemd-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm systemd-container-234-lp150.20.3.1.i586.rpm systemd-container-debuginfo-234-lp150.20.3.1.i586.rpm systemd-coredump-234-lp150.20.3.1.i586.rpm systemd-coredump-debuginfo-234-lp150.20.3.1.i586.rpm systemd-debuginfo-234-lp150.20.3.1.i586.rpm systemd-debugsource-234-lp150.20.3.1.i586.rpm systemd-devel-234-lp150.20.3.1.i586.rpm systemd-logger-234-lp150.20.3.1.i586.rpm systemd-sysvinit-234-lp150.20.3.1.i586.rpm udev-234-lp150.20.3.1.i586.rpm udev-debuginfo-234-lp150.20.3.1.i586.rpm openSUSE-2018-625 Recommended update for yast2-dns-server moderate openSUSE Leap 15.0 Update This update for yast2-dns-server fixes the following issues: - YaST DNS would reload named.service even when it was not running, resulting in an error (boo#1093029) yast2-dns-server-4.0.2-lp150.2.3.1.noarch.rpm yast2-dns-server-4.0.2-lp150.2.3.1.src.rpm openSUSE-2018-626 Recommended update for yast2-installation moderate openSUSE Leap 15.0 Update This update for yast2-installation fixes the following issues: - Possible crash when multipath is not available (boo#1095323) - On s390 important devices may be blocked when cio_ignore is active (boo#1095033) - AutoYaST re-installation mode detection did not work correctly on DASK disks (boo#1089547) yast2-installation-4.0.63-lp150.2.6.1.noarch.rpm yast2-installation-4.0.63-lp150.2.6.1.src.rpm openSUSE-2018-633 Recommended update for python-kiwi moderate openSUSE Leap 15.0 Update This update for python-kiwi fixes the following issues: - Adding 'additionaltags' containerconfig attribute to support multiple tags for containers - Bugfix: Does no longer delete uncompressed base docker images - Bugfix: Does no longer create static dev nodes in root init (bsc#1087104) - Bugfix: Adds the initrd-root-fs.target service dependency to auto generated sysroot.mount for kiwi-live and kiwi-overlay dracut modules. - Adds a verification to check that the target file doesn't exist before creating a symlink - Adds a documentation for config-cdroot archive - Bugfix: Fix setup of LOADER_TYPE in sysconfig/bootloader (bsc#1094883) dracut-kiwi-lib-9.15.3-lp150.2.6.1.x86_64.rpm dracut-kiwi-live-9.15.3-lp150.2.6.1.x86_64.rpm dracut-kiwi-oem-dump-9.15.3-lp150.2.6.1.x86_64.rpm dracut-kiwi-oem-repart-9.15.3-lp150.2.6.1.x86_64.rpm dracut-kiwi-overlay-9.15.3-lp150.2.6.1.x86_64.rpm kiwi-man-pages-9.15.3-lp150.2.6.1.x86_64.rpm kiwi-pxeboot-9.15.3-lp150.2.6.1.x86_64.rpm kiwi-tools-9.15.3-lp150.2.6.1.x86_64.rpm kiwi-tools-debuginfo-9.15.3-lp150.2.6.1.x86_64.rpm python-kiwi-9.15.3-lp150.2.6.1.src.rpm python-kiwi-debugsource-9.15.3-lp150.2.6.1.x86_64.rpm python2-kiwi-9.15.3-lp150.2.6.1.x86_64.rpm python3-kiwi-9.15.3-lp150.2.6.1.x86_64.rpm dracut-kiwi-lib-9.15.3-lp150.2.6.1.i586.rpm dracut-kiwi-live-9.15.3-lp150.2.6.1.i586.rpm dracut-kiwi-oem-dump-9.15.3-lp150.2.6.1.i586.rpm dracut-kiwi-oem-repart-9.15.3-lp150.2.6.1.i586.rpm dracut-kiwi-overlay-9.15.3-lp150.2.6.1.i586.rpm kiwi-man-pages-9.15.3-lp150.2.6.1.i586.rpm kiwi-pxeboot-9.15.3-lp150.2.6.1.i586.rpm kiwi-tools-9.15.3-lp150.2.6.1.i586.rpm kiwi-tools-debuginfo-9.15.3-lp150.2.6.1.i586.rpm python-kiwi-debugsource-9.15.3-lp150.2.6.1.i586.rpm python2-kiwi-9.15.3-lp150.2.6.1.i586.rpm python3-kiwi-9.15.3-lp150.2.6.1.i586.rpm openSUSE-2018-634 Recommended update for salt moderate openSUSE Leap 15.0 Update This update for salt fixes the following issues: - Updates the documentation to 2018.3.0 - No more AWS EC2 rate limitations in salt-cloud (bsc#1088888) - MySQL returner now also allows to use Unix sockets (bsc#1091371) - Do not override jid on returners, only sending back to master (bsc#1092373) - salt-ssh: * Bugfix: Option --extra-filerefs doesn't add all files to the state archive * Pillar completely overwritten (not merged) when doing module.run + state.apply with pillar in kwargs - Remove minion/thin/version if exists to force thin regeneration (bsc#1092161) python2-salt-2018.3.0-lp150.3.3.1.x86_64.rpm python3-salt-2018.3.0-lp150.3.3.1.x86_64.rpm salt-2018.3.0-lp150.3.3.1.src.rpm salt-2018.3.0-lp150.3.3.1.x86_64.rpm salt-api-2018.3.0-lp150.3.3.1.x86_64.rpm salt-bash-completion-2018.3.0-lp150.3.3.1.noarch.rpm salt-cloud-2018.3.0-lp150.3.3.1.x86_64.rpm salt-doc-2018.3.0-lp150.3.3.1.x86_64.rpm salt-fish-completion-2018.3.0-lp150.3.3.1.noarch.rpm salt-master-2018.3.0-lp150.3.3.1.x86_64.rpm salt-minion-2018.3.0-lp150.3.3.1.x86_64.rpm salt-proxy-2018.3.0-lp150.3.3.1.x86_64.rpm salt-ssh-2018.3.0-lp150.3.3.1.x86_64.rpm salt-syndic-2018.3.0-lp150.3.3.1.x86_64.rpm salt-zsh-completion-2018.3.0-lp150.3.3.1.noarch.rpm openSUSE-2018-635 Recommended update for yast2-nfs-client moderate openSUSE Leap 15.0 Update This update for yast2-nfs-client fixes the following issues: - Fixed a regression that was preventing some strings to be translated. - Do not crash when 'edit' button is pressed in the partitioner if there are no NFS entries (affects installation, part of fate#318196). - When executed standalone (not embedded in the Partitioner), use storage-ng to read and write /etc/fstab, instead of the old buggy parser (boo#429326, bsc#1064437). yast2-nfs-client-4.0.6-lp150.2.3.1.noarch.rpm yast2-nfs-client-4.0.6-lp150.2.3.1.src.rpm openSUSE-2018-639 Recommended update for pin moderate openSUSE Leap 15.0 Update This update for pin fixes the following issues: - Bugfix: pin was broken on systems without /etc/SuSE-release file (boo#1095723) pin-0.38-lp150.2.3.1.noarch.rpm pin-0.38-lp150.2.3.1.src.rpm openSUSE-2018-657 Recommended update for switcheroo-control moderate openSUSE Leap 15.0 Update This update for switcheroo-control fixes the following issues: - Adds a service file for switcheroo-control (boo#1096823). switcheroo-control-1.2-lp150.2.3.1.src.rpm switcheroo-control-1.2-lp150.2.3.1.x86_64.rpm switcheroo-control-debuginfo-1.2-lp150.2.3.1.x86_64.rpm switcheroo-control-debugsource-1.2-lp150.2.3.1.x86_64.rpm switcheroo-control-doc-1.2-lp150.2.3.1.noarch.rpm openSUSE-2018-658 Recommended update for diskimage-builder moderate openSUSE Leap 15.0 Update This is an update for diskimage-builder to version 2.15.1 including the following fixes/features: Version 2.15.1 (boo#1097115): - elements: pip-and-virtualenv: Handle openSUSE Leap 15 - Allow to rebuild arbitrary images - Replace the ubuntu-minimal trusty test with a bionic one - Remove non-maintained ubuntu-core element - elements: zypper-minimal: Add support for openSUSE Leap 15.X - Add support for Ubuntu 18.04 - Bugfix: Remove duplicate GRUB command line entry - rpm-distro: set the contentdir yum var - Fixes add-apt-keys in dpkg element - Add pip cache cleanup to pip-and-virtualenv - pip-and-virtualenv: fix install-pip when centos-release-openstack is enabled diskimage-builder-2.15.1-lp150.2.3.1.noarch.rpm diskimage-builder-2.15.1-lp150.2.3.1.src.rpm openSUSE-2018-654 Security update for matrix-synapse moderate openSUSE Leap 15.0 Update This update for matrix-synapse fixes the following security issue: - CVE-2018-12291: visibility rules were not applied correctly in the get_missing_events federation API (boo#1096833) matrix-synapse-0.28.1-lp150.2.4.1.src.rpm python2-matrix-synapse-0.28.1-lp150.2.4.1.noarch.rpm python3-matrix-synapse-0.28.1-lp150.2.4.1.noarch.rpm matrix-synapse-test-0.28.1-lp150.2.4.1.src.rpm openSUSE-2018-647 Recommended update for calibre moderate openSUSE Leap 15.0 Update This update for calibre adds support for a number of e-book reads, amoung other improvements: - Support Kobo Clara HD (boo#1097180)o - Improve PDF output - Various UI and e-book handling bug fixes - Add option to output EPUB 3 files calibre-3.25.0-lp150.3.3.1.src.rpm calibre-3.25.0-lp150.3.3.1.x86_64.rpm calibre-debuginfo-3.25.0-lp150.3.3.1.x86_64.rpm calibre-debugsource-3.25.0-lp150.3.3.1.x86_64.rpm openSUSE-2018-630 Security update for enigmail moderate openSUSE Leap 15.0 Update This update for enigmail fixes vulnerabilities that allowed spoofing of e-mail signatures: - CVE-2018-12019: signature spoofing via specially crafted OpenPGP user IDs (boo#1097525) - CVE-2018-12020: signature spoofing via diagnostic output of the original file name in GnuPG verbose mode (boo#1096745) This mitigation prevents CVE-2018-12020 from being exploited even if GnuPG is not patched. enigmail-2.0.7-lp150.2.12.1.src.rpm enigmail-2.0.7-lp150.2.12.1.x86_64.rpm openSUSE-2018-646 Security update for python-python-gnupg moderate openSUSE Leap 15.0 Update This update for python-python-gnupg to version 0.4.3 fixes the following issues: The following security vulnerabilities were addressed: - Sanitize diagnostic output of the original file name in verbose mode (CVE-2018-12020 boo#1096745) The following other changes were made: - Add --no-verbose to the gpg command line, in case verbose is specified is gpg.conf. - Add expect_passphrase password for use on GnuPG >= 2.1 when passing passphrase to gpg via pinentry - Provide a trust_keys method to allow setting the trust level for keys - When the gpg executable is not found, note the path used in the exception message - Make error messages more informational python-python-gnupg-0.4.3-lp150.2.3.1.src.rpm python2-python-gnupg-0.4.3-lp150.2.3.1.noarch.rpm python3-python-gnupg-0.4.3-lp150.2.3.1.noarch.rpm openSUSE-2018-641 Security update for java-1_8_0-openjdk important openSUSE Leap 15.0 Update This update for java-1_8_0-openjdk to version 8u171 fixes the following issues: These security issues were fixed: - S8180881: Better packaging of deserialization - S8182362: Update CipherOutputStream Usage - S8183032: Upgrade to LittleCMS 2.9 - S8189123: More consistent classloading - S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries - S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability - S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability - S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability - S8189989, CVE-2018-2798, bsc#1090028: Improve container portability - S8189993, CVE-2018-2799, bsc#1090029: Improve document portability - S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms - S8190478: Improved interface method selection - S8190877: Better handling of abstract classes - S8191696: Better mouse positioning - S8192025, CVE-2018-2814, bsc#1090032: Less referential references - S8192030: Better MTSchema support - S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation - S8193409: Improve AES supporting classes - S8193414: Improvements in MethodType lookups - S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support For other changes please consult the changelog. This update was imported from the SUSE:SLE-12-SP1:Update update project. java-1_8_0-openjdk-1.8.0.171-lp150.2.3.1.src.rpm java-1_8_0-openjdk-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-accessibility-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-debuginfo-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-debugsource-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-demo-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-devel-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-headless-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-javadoc-1.8.0.171-lp150.2.3.1.noarch.rpm java-1_8_0-openjdk-src-1.8.0.171-lp150.2.3.1.x86_64.rpm java-1_8_0-openjdk-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-accessibility-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-debuginfo-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-debugsource-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-demo-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-devel-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-headless-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-lp150.2.3.1.i586.rpm java-1_8_0-openjdk-src-1.8.0.171-lp150.2.3.1.i586.rpm openSUSE-2018-640 Security update for gpg2 important openSUSE Leap 15.0 Update This update for gpg2 fixes the following security issue: - CVE-2018-12020: GnuPG mishandled the original filename during decryption and verification actions, which allowed remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option (bsc#1096745) gpg2-2.2.5-lp150.3.3.1.src.rpm gpg2-2.2.5-lp150.3.3.1.x86_64.rpm gpg2-debuginfo-2.2.5-lp150.3.3.1.x86_64.rpm gpg2-debugsource-2.2.5-lp150.3.3.1.x86_64.rpm gpg2-lang-2.2.5-lp150.3.3.1.noarch.rpm gpg2-2.2.5-lp150.3.3.1.i586.rpm gpg2-debuginfo-2.2.5-lp150.3.3.1.i586.rpm gpg2-debugsource-2.2.5-lp150.3.3.1.i586.rpm openSUSE-2018-667 Security update for redis important openSUSE Leap 15.0 Update This update for redis to 4.0.10 fixes the following issues: These security issues were fixed: - CVE-2018-11218: Prevent heap corruption vulnerability in cmsgpack (bsc#1097430). - CVE-2018-11219: Prevent integer overflow in Lua scripting (bsc#1097768). For Leap 42.3 and openSUSE SLE 12 backports this is a jump from 4.0.6. For additional details please see - https://raw.githubusercontent.com/antirez/redis/4.0.9/00-RELEASENOTES - https://raw.githubusercontent.com/antirez/redis/4.0.8/00-RELEASENOTES - https://raw.githubusercontent.com/antirez/redis/4.0.7/00-RELEASENOTES redis-4.0.10-lp150.3.3.1.src.rpm redis-4.0.10-lp150.3.3.1.x86_64.rpm redis-debuginfo-4.0.10-lp150.3.3.1.x86_64.rpm redis-debugsource-4.0.10-lp150.3.3.1.x86_64.rpm openSUSE-2018-672 Security update for go1.9 moderate openSUSE Leap 15.0 Update This update for go1.9 fixes the following issues: Security issues fixed: - CVE-2018-7187: arbitrary command execution via VCS path (boo#1081495) Non-security changes: - Update to version 1.9.7 - fixes to the go command and compiler - minimal support to the go command for the vgo transition go-1.9.7-lp150.2.4.1.src.rpm go-1.9.7-lp150.2.4.1.x86_64.rpm go-doc-1.9.7-lp150.2.4.1.x86_64.rpm go-race-1.9.7-lp150.2.4.1.x86_64.rpm go1.9-1.9.7-lp150.2.4.2.src.rpm go1.9-1.9.7-lp150.2.4.2.x86_64.rpm go1.9-doc-1.9.7-lp150.2.4.2.x86_64.rpm go1.9-race-1.9.7-lp150.2.4.2.x86_64.rpm go-1.9.7-lp150.2.4.1.i586.rpm go-doc-1.9.7-lp150.2.4.1.i586.rpm go1.9-1.9.7-lp150.2.4.2.i586.rpm go1.9-doc-1.9.7-lp150.2.4.2.i586.rpm openSUSE-2018-673 Recommended update for hg-git moderate openSUSE Leap 15.0 Update This update for hg-git fixes the following issues: - hg-git was incompatible with mercurial 4.5 (boo#1096561) This update to version 0.8.11 also contains the following changes: - add config knob for marking git branches public - re-enable support for git subrepositories hg-git-0.8.11-lp150.2.3.1.noarch.rpm hg-git-0.8.11-lp150.2.3.1.src.rpm openSUSE-2018-666 Recommended update for perl-Finance-Quote moderate openSUSE Leap 15.0 Update This update for perl-Finance-Quote fixes the following issues: - GnuCash was no longer able to retrieve pricing information for various securities (boo#1077300) perl-Finance-Quote-1.47-lp150.2.3.1.noarch.rpm perl-Finance-Quote-1.47-lp150.2.3.1.src.rpm openSUSE-2018-671 Recommended update for hylafax+ important openSUSE Leap 15.0 Update This update for hylafax+ fixes the following issues: - hylafax+ failed to start with message '550 Cannot set privileges' (boo#1091476) hylafax+-5.5.9-lp150.5.3.1.src.rpm hylafax+-5.5.9-lp150.5.3.1.x86_64.rpm hylafax+-client-5.5.9-lp150.5.3.1.x86_64.rpm hylafax+-client-debuginfo-5.5.9-lp150.5.3.1.x86_64.rpm hylafax+-debuginfo-5.5.9-lp150.5.3.1.x86_64.rpm hylafax+-debugsource-5.5.9-lp150.5.3.1.x86_64.rpm libfaxutil5_5_9-5.5.9-lp150.5.3.1.x86_64.rpm libfaxutil5_5_9-debuginfo-5.5.9-lp150.5.3.1.x86_64.rpm openSUSE-2018-689 Security update for GraphicsMagick low openSUSE Leap 15.0 Update This update for GraphicsMagick fixes the following issues: The following security fixes were fixed: - CVE-2018-10805: Fixed a memory leak in ReadYCBCRImage in coders/ycbcr.c and rgb.c, cmyk.c and gray.c (boo#1095812) - Fixed invalid memory reads in dcm.c (boo#1075821#c14) GraphicsMagick-1.3.29-lp150.3.6.1.src.rpm GraphicsMagick-1.3.29-lp150.3.6.1.x86_64.rpm GraphicsMagick-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm GraphicsMagick-debugsource-1.3.29-lp150.3.6.1.x86_64.rpm GraphicsMagick-devel-1.3.29-lp150.3.6.1.x86_64.rpm libGraphicsMagick++-Q16-12-1.3.29-lp150.3.6.1.x86_64.rpm libGraphicsMagick++-Q16-12-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm libGraphicsMagick++-devel-1.3.29-lp150.3.6.1.x86_64.rpm libGraphicsMagick-Q16-3-1.3.29-lp150.3.6.1.x86_64.rpm libGraphicsMagick-Q16-3-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm libGraphicsMagick3-config-1.3.29-lp150.3.6.1.x86_64.rpm libGraphicsMagickWand-Q16-2-1.3.29-lp150.3.6.1.x86_64.rpm libGraphicsMagickWand-Q16-2-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm perl-GraphicsMagick-1.3.29-lp150.3.6.1.x86_64.rpm perl-GraphicsMagick-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm openSUSE-2018-679 Recommended update for kwayland moderate openSUSE Leap 15.0 Update This update for kwayland fixes the following issues: - Under Wayland, copy-past from GTK3 applications did not work (boo#1097606) kwayland-5.45.0-lp150.2.3.1.src.rpm kwayland-5.45.0-lp150.2.3.1.x86_64.rpm kwayland-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm kwayland-debugsource-5.45.0-lp150.2.3.1.x86_64.rpm kwayland-devel-5.45.0-lp150.2.3.1.x86_64.rpm kwayland-devel-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm kwayland-32bit-5.45.0-lp150.2.3.1.x86_64.rpm kwayland-32bit-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm kwayland-5.45.0-lp150.2.3.1.i586.rpm kwayland-debuginfo-5.45.0-lp150.2.3.1.i586.rpm kwayland-debugsource-5.45.0-lp150.2.3.1.i586.rpm kwayland-devel-32bit-5.45.0-lp150.2.3.1.x86_64.rpm kwayland-devel-32bit-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm kwayland-devel-5.45.0-lp150.2.3.1.i586.rpm kwayland-devel-debuginfo-5.45.0-lp150.2.3.1.i586.rpm openSUSE-2018-670 Recommended update for VirtualGL moderate openSUSE Leap 15.0 Update This update for VirtualGL fixes the following issues: - VirtualGL would pick up the Nvidia OpenGL library to environment files which changed the preload order (boo#1097210) VirtualGL-2.5.2-lp150.2.3.1.src.rpm VirtualGL-2.5.2-lp150.2.3.1.x86_64.rpm VirtualGL-debuginfo-2.5.2-lp150.2.3.1.x86_64.rpm VirtualGL-debugsource-2.5.2-lp150.2.3.1.x86_64.rpm VirtualGL-devel-2.5.2-lp150.2.3.1.x86_64.rpm VirtualGL-2.5.2-lp150.2.3.1.i586.rpm VirtualGL-32bit-2.5.2-lp150.2.3.1.x86_64.rpm VirtualGL-32bit-debuginfo-2.5.2-lp150.2.3.1.x86_64.rpm VirtualGL-debuginfo-2.5.2-lp150.2.3.1.i586.rpm VirtualGL-debugsource-2.5.2-lp150.2.3.1.i586.rpm VirtualGL-devel-2.5.2-lp150.2.3.1.i586.rpm openSUSE-2018-680 Recommended update for libXaw moderate openSUSE Leap 15.0 Update This update for libXaw fixes the following issues: - a segmentation fault may have occurred in xen PV domU during a live migration if a required font was not installed (boo#1098411) libXaw-1.0.13-lp150.2.3.1.src.rpm libXaw-debugsource-1.0.13-lp150.2.3.1.x86_64.rpm libXaw-devel-1.0.13-lp150.2.3.1.x86_64.rpm libXaw6-1.0.13-lp150.2.3.1.x86_64.rpm libXaw6-debuginfo-1.0.13-lp150.2.3.1.x86_64.rpm libXaw7-1.0.13-lp150.2.3.1.x86_64.rpm libXaw7-debuginfo-1.0.13-lp150.2.3.1.x86_64.rpm libXaw8-1.0.13-lp150.2.3.1.x86_64.rpm libXaw-debugsource-1.0.13-lp150.2.3.1.i586.rpm libXaw-devel-1.0.13-lp150.2.3.1.i586.rpm libXaw-devel-32bit-1.0.13-lp150.2.3.1.x86_64.rpm libXaw6-1.0.13-lp150.2.3.1.i586.rpm libXaw6-32bit-1.0.13-lp150.2.3.1.x86_64.rpm libXaw6-32bit-debuginfo-1.0.13-lp150.2.3.1.x86_64.rpm libXaw6-debuginfo-1.0.13-lp150.2.3.1.i586.rpm libXaw7-1.0.13-lp150.2.3.1.i586.rpm libXaw7-32bit-1.0.13-lp150.2.3.1.x86_64.rpm libXaw7-32bit-debuginfo-1.0.13-lp150.2.3.1.x86_64.rpm libXaw7-debuginfo-1.0.13-lp150.2.3.1.i586.rpm libXaw8-1.0.13-lp150.2.3.1.i586.rpm libXaw8-32bit-1.0.13-lp150.2.3.1.x86_64.rpm openSUSE-2018-669 Security update for phpMyAdmin important openSUSE Leap 15.0 Update This update for phpMyAdmin fixes multiple issues. Security issues fixed: * CVE-2018-12613: File inclusion and remote code execution attack (boo#1098751) * CVE-2018-12581: XSS in Designer feature (boo#1098752) This update to version 4.8.2 also contains number of upstream bug fixes and improvements. phpMyAdmin-4.8.2-lp150.2.3.1.noarch.rpm phpMyAdmin-4.8.2-lp150.2.3.1.src.rpm openSUSE-2018-681 Recommended update for putty moderate openSUSE Leap 15.0 Update This update for putty fixes the following issues: - putty did not start under Wayland (boo#1098962) putty-0.70-lp150.4.3.1.src.rpm putty-0.70-lp150.4.3.1.x86_64.rpm putty-debuginfo-0.70-lp150.4.3.1.x86_64.rpm putty-debugsource-0.70-lp150.4.3.1.x86_64.rpm openSUSE-2018-682 Optional update for znc moderate openSUSE Leap 15.0 Update This optional update makes available znc version 1.7.0 with multiple useful features: - Implement IRCv3.2 capabilities away-notify, account-notify, extended-join - Implement IRCv3.2 capabilities echo-message, cap-notify on the "client side" - Update capability names as they are named in IRCv3.2 - Make ZNC request server-time from server when available (#839) - Increase accepted line length from 1024 to 2048 to give some space to message tags - Support separate SSLKeyFile and SSLDHParamFile configuration in addition to existing SSLCertFile - Add modules: pyeval, stripcontrols - Add new substitutions to ExpandString: %empty% and %network% - Add ClearAllBuffers command - Set HttpOnly and SameSite=strict for session cookies - Add SNI SSL client support (#1200) - Add support for CIDR notation in allowed hosts list and in trusted proxy list - Add network-specific config for cert validation in addition to user-supplied fingerprints - Add /attach command for symmetry with /detach znc-1.7.0-lp150.2.3.1.src.rpm znc-1.7.0-lp150.2.3.1.x86_64.rpm znc-debuginfo-1.7.0-lp150.2.3.1.x86_64.rpm znc-debugsource-1.7.0-lp150.2.3.1.x86_64.rpm znc-devel-1.7.0-lp150.2.3.1.x86_64.rpm znc-lang-1.7.0-lp150.2.3.1.noarch.rpm znc-perl-1.7.0-lp150.2.3.1.x86_64.rpm znc-perl-debuginfo-1.7.0-lp150.2.3.1.x86_64.rpm znc-python3-1.7.0-lp150.2.3.1.x86_64.rpm znc-python3-debuginfo-1.7.0-lp150.2.3.1.x86_64.rpm znc-tcl-1.7.0-lp150.2.3.1.x86_64.rpm znc-tcl-debuginfo-1.7.0-lp150.2.3.1.x86_64.rpm openSUSE-2018-678 Recommended update for wireless-regdb moderate openSUSE Leap 15.0 Update This update for wireless-regdb to version 2018.05.09 provides the following fixes: (bsc#1095397) - Updated regulatory database for France and Panama. - Fixes in python3 scripts. This update was imported from the SUSE:SLE-12:Update update project. wireless-regdb-2018.05.09-lp150.2.3.1.noarch.rpm wireless-regdb-2018.05.09-lp150.2.3.1.src.rpm openSUSE-2018-676 Security update for MozillaFirefox important openSUSE Leap 15.0 Update This security update for MozillaFirefox to version 60.1.0esr fixes multiple issues. Security issues fixed (MFSA 2018-16, boo#1098998): - CVE-2018-12359: Buffer overflow using computed size of canvas element - CVE-2018-12360: Use-after-free when using focus() - CVE-2018-12361: Integer overflow in SwizzleData - CVE-2018-12362: Integer overflow in SSSE3 scaler - CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture - CVE-2018-12363: Use-after-free when appending DOM nodes - CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins - CVE-2018-12365: Compromised IPC child process can list local filenames - CVE-2018-12371: Integer overflow in Skia library during edge builder allocation - CVE-2018-12366: Invalid data handling during QCMS transformations - CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming - CVE-2018-12369: WebExtension security permission checks bypassed by embedded experiments - CVE-2018-5187: Memory safety bugs fixed in Firefox 60 and Firefox ESR 60.1 - CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, and Firefox ESR 52.9 Other issues fixed: - various stability and regression fixes - do not disable system installed unsigned language packs (bmo#1464766) MozillaFirefox-60.1.0-lp150.3.11.1.src.rpm MozillaFirefox-60.1.0-lp150.3.11.1.x86_64.rpm MozillaFirefox-branding-upstream-60.1.0-lp150.3.11.1.x86_64.rpm MozillaFirefox-buildsymbols-60.1.0-lp150.3.11.1.x86_64.rpm MozillaFirefox-debuginfo-60.1.0-lp150.3.11.1.x86_64.rpm MozillaFirefox-debugsource-60.1.0-lp150.3.11.1.x86_64.rpm MozillaFirefox-devel-60.1.0-lp150.3.11.1.x86_64.rpm MozillaFirefox-translations-common-60.1.0-lp150.3.11.1.x86_64.rpm MozillaFirefox-translations-other-60.1.0-lp150.3.11.1.x86_64.rpm openSUSE-2018-691 Security update for mailman moderate openSUSE Leap 15.0 Update This update for mailman to version 2.1.27 fixes the following issues: This security issue was fixed: - CVE-2018-0618: Additional protections against injecting scripts into listinfo and error messages pages (bsc#1099510). These non-security issues were fixed: - The hash generated when SUBSCRIBE_FORM_SECRET is set could have been the same as one generated at the same time for a different list and IP address. - An option has been added to bin/add_members to issue invitations instead of immediately adding members. - A new BLOCK_SPAMHAUS_LISTED_IP_SUBSCRIBE setting has been added to enable blocking web subscribes from IPv4 addresses listed in Spamhaus SBL, CSS or XBL. It will work with IPv6 addresses if Python's py2-ipaddress module is installed. The module can be installed via pip if not included in your Python. - Mailman has a new 'security' log and logs authentication failures to the various web CGI functions. The logged data include the remote IP and can be used to automate blocking of IPs with something like fail2ban. Since Mailman 2.1.14, these have returned an http 401 status and the information should be logged by the web server, but this new log makes that more convenient. Also, the 'mischief' log entries for 'hostile listname' noe include the remote IP if available. - admin notices of (un)subscribes now may give the source of the action. This consists of a %(whence)s replacement that has been added to the admin(un)subscribeack.txt templates. Thanks to Yasuhito FUTATSUKI for updating the non-English templates and help with internationalizing the reasons. - there is a new BLOCK_SPAMHAUS_LISTED_DBL_SUBSCRIBE setting to enable blocking web subscribes for addresses in domains listed in the Spamhaus DBL. mailman-2.1.27-lp150.2.3.1.src.rpm mailman-2.1.27-lp150.2.3.1.x86_64.rpm mailman-debuginfo-2.1.27-lp150.2.3.1.x86_64.rpm mailman-debugsource-2.1.27-lp150.2.3.1.x86_64.rpm openSUSE-2018-692 Recommended update for spec-cleaner moderate openSUSE Leap 15.0 Update This update for spec-cleaner fixes the following issues (boo#1099674): - An error was reported on parsing non-utf spec-file - Move some checks from rpmlint to be autochecked - Use Leap 15.0 as base for conversions to pkgconfig/etc spec-cleaner-1.1.0-lp150.2.5.1.noarch.rpm spec-cleaner-1.1.0-lp150.2.5.1.src.rpm spec-cleaner-format_spec_file-1.1.0-lp150.2.5.1.noarch.rpm openSUSE-2018-695 Recommended update for curl moderate openSUSE Leap 15.0 Update This update for curl provides the following fix: - Use OPENSSL_config() instead of CONF_modules_load_file() to avoid crashes due to conflicting openssl engines. (bsc#1086367) This update was imported from the SUSE:SLE-15:Update update project. curl-mini-7.60.0-lp150.2.6.1.src.rpm curl-mini-7.60.0-lp150.2.6.1.x86_64.rpm curl-mini-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm curl-mini-debugsource-7.60.0-lp150.2.6.1.x86_64.rpm libcurl-mini-devel-7.60.0-lp150.2.6.1.x86_64.rpm libcurl4-mini-7.60.0-lp150.2.6.1.x86_64.rpm libcurl4-mini-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm curl-7.60.0-lp150.2.6.1.src.rpm curl-7.60.0-lp150.2.6.1.x86_64.rpm curl-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm curl-debugsource-7.60.0-lp150.2.6.1.x86_64.rpm libcurl-devel-7.60.0-lp150.2.6.1.x86_64.rpm libcurl4-7.60.0-lp150.2.6.1.x86_64.rpm libcurl4-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm curl-mini-7.60.0-lp150.2.6.1.i586.rpm curl-mini-debuginfo-7.60.0-lp150.2.6.1.i586.rpm curl-mini-debugsource-7.60.0-lp150.2.6.1.i586.rpm libcurl-mini-devel-7.60.0-lp150.2.6.1.i586.rpm libcurl4-mini-7.60.0-lp150.2.6.1.i586.rpm libcurl4-mini-debuginfo-7.60.0-lp150.2.6.1.i586.rpm curl-7.60.0-lp150.2.6.1.i586.rpm curl-debuginfo-7.60.0-lp150.2.6.1.i586.rpm curl-debugsource-7.60.0-lp150.2.6.1.i586.rpm libcurl-devel-32bit-7.60.0-lp150.2.6.1.x86_64.rpm libcurl-devel-7.60.0-lp150.2.6.1.i586.rpm libcurl4-32bit-7.60.0-lp150.2.6.1.x86_64.rpm libcurl4-32bit-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm libcurl4-7.60.0-lp150.2.6.1.i586.rpm libcurl4-debuginfo-7.60.0-lp150.2.6.1.i586.rpm