openSUSE-2018-486
Security update for Mozilla Thunderbird
important
openSUSE Leap 15.0 Update
This update for Mozilla Thunderbird to version 52.8 fixes the following issues:
Security issues fixed (MFSA 2018-13, boo#1092548):
- CVE-2018-5183: Backport critical security fixes in Skia
- CVE-2018-5154: Use-after-free with SVG animations and clip paths
- CVE-2018-5155: Use-after-free with SVG animations and text paths
- CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- CVE-2018-5168: Lightweight themes can be installed without user interaction
- CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
- CVE-2018-5150: Memory safety bugs fixed in Firefox 60, Firefox ESR 52.8, and Thunderbird 52.8
- CVE-2018-5161: Hang via malformed headers (bsc#1093970)
- CVE-2018-5162: Encrypted mail leaks plaintext through src attribute (bsc#1093971)
- CVE-2018-5170: Filename spoofing for external attachments (bsc#1093972)
- CVE-2018-5184: Full plaintext recovery in S/MIME via chosen-ciphertext attack (bsc#1093969)
- CVE-2018-5185: Leaking plaintext through HTML forms (bsc#1093973)
MozillaThunderbird-52.8-lp150.3.3.2.src.rpm
MozillaThunderbird-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-buildsymbols-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-debuginfo-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-debugsource-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-devel-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-translations-common-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-translations-other-52.8-lp150.3.3.2.x86_64.rpm
openSUSE-2018-473
Recommended update for timezone, timezone-java
low
openSUSE Leap 15.0 Update
This update provides the latest timezone information (2018e) for your system, including following changes:
- North Korea switches back from +0830 to +09 on 2018-05-05.
- Ireland's standard time is in the summer, with negative DST
offset to standard time used in Winter (bsc#1073299)
timezone-java-2018e-lp150.2.3.3.noarch.rpm
timezone-java-2018e-lp150.2.3.3.src.rpm
timezone-2018e-lp150.2.3.3.src.rpm
timezone-2018e-lp150.2.3.3.x86_64.rpm
timezone-debuginfo-2018e-lp150.2.3.3.x86_64.rpm
timezone-debugsource-2018e-lp150.2.3.3.x86_64.rpm
timezone-2018e-lp150.2.3.3.i586.rpm
timezone-debuginfo-2018e-lp150.2.3.3.i586.rpm
timezone-debugsource-2018e-lp150.2.3.3.i586.rpm
openSUSE-2018-474
Security update for enigmail
moderate
openSUSE Leap 15.0 Update
This update for enigmail fixes multiple issues.
Security issues fixed:
- CVE-2017-17688: CFB gadget attacks allowed to exfiltrate plaintext out of encrypted emails.
enigmail now fails on GnuPG integrity check warnings for old Algorithms (bsc#1093151)
- CVE-2017-17689: CBC gadget attacks allows to exfiltrate plaintext out of encrypted emails (bsc#1093152)
enigmail-2.0.4-lp150.2.3.1.src.rpm
enigmail-2.0.4-lp150.2.3.1.x86_64.rpm
openSUSE-2018-512
Recommended update for MozillaFirefox
low
openSUSE Leap 15.0 Update
This update for MozillaFirefox to version 60.0.1 ESR fixes the following issues:
- Avoid overly long cycle collector pauses with some add-ons installed
- After unckecking the "Sponsored Stories" option, the New Tab page
now immediately stops displaying "Sponsored content" cards
- Use the right default background when opening tabs or windows in high contrast mode
- Restored translations of the Preferences panels when using a language pack
MozillaFirefox-60.0.1-lp150.3.3.2.src.rpm
MozillaFirefox-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-branding-upstream-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-buildsymbols-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-debuginfo-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-debugsource-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-devel-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-translations-common-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-translations-other-60.0.1-lp150.3.3.2.x86_64.rpm
openSUSE-2018-510
Recommended update for prosody
moderate
openSUSE Leap 15.0 Update
This update for prosody to version 0.10.1 fixes the following issues (boo#1093671):
- Ensure user archives are purged when a user account is deleted
- Various other upstream bug fixes and improvements
prosody-0.10.1-lp150.3.3.1.src.rpm
prosody-0.10.1-lp150.3.3.1.x86_64.rpm
prosody-debuginfo-0.10.1-lp150.3.3.1.x86_64.rpm
prosody-debugsource-0.10.1-lp150.3.3.1.x86_64.rpm
openSUSE-2018-485
Recommended update for php7
low
openSUSE Leap 15.0 Update
This update for php7 fixes the following issues:
- boo#1093025 main package requires wwwrun:www user
- better workaround for [boo#1089487]: build mod_phpN.so
instead of libphpN.so
apache2-mod_php7-7.2.5-lp150.2.3.1.x86_64.rpm
apache2-mod_php7-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-7.2.5-lp150.2.3.1.src.rpm
php7-7.2.5-lp150.2.3.1.x86_64.rpm
php7-bcmath-7.2.5-lp150.2.3.1.x86_64.rpm
php7-bcmath-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-bz2-7.2.5-lp150.2.3.1.x86_64.rpm
php7-bz2-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-calendar-7.2.5-lp150.2.3.1.x86_64.rpm
php7-calendar-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ctype-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ctype-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-curl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-curl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-dba-7.2.5-lp150.2.3.1.x86_64.rpm
php7-dba-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-debugsource-7.2.5-lp150.2.3.1.x86_64.rpm
php7-devel-7.2.5-lp150.2.3.1.x86_64.rpm
php7-dom-7.2.5-lp150.2.3.1.x86_64.rpm
php7-dom-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-embed-7.2.5-lp150.2.3.1.x86_64.rpm
php7-embed-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-enchant-7.2.5-lp150.2.3.1.x86_64.rpm
php7-enchant-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-exif-7.2.5-lp150.2.3.1.x86_64.rpm
php7-exif-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fastcgi-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fastcgi-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fileinfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fileinfo-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-firebird-7.2.5-lp150.2.3.1.x86_64.rpm
php7-firebird-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fpm-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fpm-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ftp-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ftp-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gd-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gd-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gettext-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gettext-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gmp-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gmp-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-iconv-7.2.5-lp150.2.3.1.x86_64.rpm
php7-iconv-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-intl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-intl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-json-7.2.5-lp150.2.3.1.x86_64.rpm
php7-json-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ldap-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ldap-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-mbstring-7.2.5-lp150.2.3.1.x86_64.rpm
php7-mbstring-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-mysql-7.2.5-lp150.2.3.1.x86_64.rpm
php7-mysql-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-odbc-7.2.5-lp150.2.3.1.x86_64.rpm
php7-odbc-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-opcache-7.2.5-lp150.2.3.1.x86_64.rpm
php7-opcache-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-openssl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-openssl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pcntl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pcntl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pdo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pdo-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pear-7.2.5-lp150.2.3.1.noarch.rpm
php7-pear-Archive_Tar-7.2.5-lp150.2.3.1.noarch.rpm
php7-pgsql-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pgsql-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-phar-7.2.5-lp150.2.3.1.x86_64.rpm
php7-phar-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-posix-7.2.5-lp150.2.3.1.x86_64.rpm
php7-posix-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-readline-7.2.5-lp150.2.3.1.x86_64.rpm
php7-readline-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-shmop-7.2.5-lp150.2.3.1.x86_64.rpm
php7-shmop-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-snmp-7.2.5-lp150.2.3.1.x86_64.rpm
php7-snmp-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-soap-7.2.5-lp150.2.3.1.x86_64.rpm
php7-soap-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sockets-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sockets-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sodium-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sodium-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sqlite-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sqlite-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvmsg-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvmsg-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvsem-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvsem-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvshm-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvshm-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-tidy-7.2.5-lp150.2.3.1.x86_64.rpm
php7-tidy-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-tokenizer-7.2.5-lp150.2.3.1.x86_64.rpm
php7-tokenizer-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-wddx-7.2.5-lp150.2.3.1.x86_64.rpm
php7-wddx-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlreader-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlreader-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlrpc-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlrpc-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlwriter-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlwriter-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xsl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xsl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-zip-7.2.5-lp150.2.3.1.x86_64.rpm
php7-zip-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-zlib-7.2.5-lp150.2.3.1.x86_64.rpm
php7-zlib-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
apache2-mod_php7-7.2.5-lp150.2.3.1.i586.rpm
apache2-mod_php7-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-7.2.5-lp150.2.3.1.i586.rpm
php7-bcmath-7.2.5-lp150.2.3.1.i586.rpm
php7-bcmath-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-bz2-7.2.5-lp150.2.3.1.i586.rpm
php7-bz2-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-calendar-7.2.5-lp150.2.3.1.i586.rpm
php7-calendar-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-ctype-7.2.5-lp150.2.3.1.i586.rpm
php7-ctype-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-curl-7.2.5-lp150.2.3.1.i586.rpm
php7-curl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-dba-7.2.5-lp150.2.3.1.i586.rpm
php7-dba-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-debugsource-7.2.5-lp150.2.3.1.i586.rpm
php7-devel-7.2.5-lp150.2.3.1.i586.rpm
php7-dom-7.2.5-lp150.2.3.1.i586.rpm
php7-dom-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-embed-7.2.5-lp150.2.3.1.i586.rpm
php7-embed-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-enchant-7.2.5-lp150.2.3.1.i586.rpm
php7-enchant-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-exif-7.2.5-lp150.2.3.1.i586.rpm
php7-exif-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-fastcgi-7.2.5-lp150.2.3.1.i586.rpm
php7-fastcgi-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-fileinfo-7.2.5-lp150.2.3.1.i586.rpm
php7-fileinfo-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-firebird-7.2.5-lp150.2.3.1.i586.rpm
php7-firebird-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-fpm-7.2.5-lp150.2.3.1.i586.rpm
php7-fpm-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-ftp-7.2.5-lp150.2.3.1.i586.rpm
php7-ftp-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-gd-7.2.5-lp150.2.3.1.i586.rpm
php7-gd-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-gettext-7.2.5-lp150.2.3.1.i586.rpm
php7-gettext-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-gmp-7.2.5-lp150.2.3.1.i586.rpm
php7-gmp-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-iconv-7.2.5-lp150.2.3.1.i586.rpm
php7-iconv-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-intl-7.2.5-lp150.2.3.1.i586.rpm
php7-intl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-json-7.2.5-lp150.2.3.1.i586.rpm
php7-json-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-ldap-7.2.5-lp150.2.3.1.i586.rpm
php7-ldap-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-mbstring-7.2.5-lp150.2.3.1.i586.rpm
php7-mbstring-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-mysql-7.2.5-lp150.2.3.1.i586.rpm
php7-mysql-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-odbc-7.2.5-lp150.2.3.1.i586.rpm
php7-odbc-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-opcache-7.2.5-lp150.2.3.1.i586.rpm
php7-opcache-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-openssl-7.2.5-lp150.2.3.1.i586.rpm
php7-openssl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-pcntl-7.2.5-lp150.2.3.1.i586.rpm
php7-pcntl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-pdo-7.2.5-lp150.2.3.1.i586.rpm
php7-pdo-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-pgsql-7.2.5-lp150.2.3.1.i586.rpm
php7-pgsql-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-phar-7.2.5-lp150.2.3.1.i586.rpm
php7-phar-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-posix-7.2.5-lp150.2.3.1.i586.rpm
php7-posix-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-readline-7.2.5-lp150.2.3.1.i586.rpm
php7-readline-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-shmop-7.2.5-lp150.2.3.1.i586.rpm
php7-shmop-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-snmp-7.2.5-lp150.2.3.1.i586.rpm
php7-snmp-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-soap-7.2.5-lp150.2.3.1.i586.rpm
php7-soap-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sockets-7.2.5-lp150.2.3.1.i586.rpm
php7-sockets-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sodium-7.2.5-lp150.2.3.1.i586.rpm
php7-sodium-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sqlite-7.2.5-lp150.2.3.1.i586.rpm
php7-sqlite-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvmsg-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvmsg-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvsem-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvsem-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvshm-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvshm-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-tidy-7.2.5-lp150.2.3.1.i586.rpm
php7-tidy-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-tokenizer-7.2.5-lp150.2.3.1.i586.rpm
php7-tokenizer-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-wddx-7.2.5-lp150.2.3.1.i586.rpm
php7-wddx-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlreader-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlreader-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlrpc-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlrpc-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlwriter-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlwriter-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-xsl-7.2.5-lp150.2.3.1.i586.rpm
php7-xsl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-zip-7.2.5-lp150.2.3.1.i586.rpm
php7-zip-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-zlib-7.2.5-lp150.2.3.1.i586.rpm
php7-zlib-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
openSUSE-2018-483
Recommended update for vsftpd
important
openSUSE Leap 15.0 Update
This update for vsftpd fixes the following issue:
- boo#1089088: vsftpd did not work if seccomp was enabled
vsftpd-3.0.3-lp150.5.3.1.src.rpm
vsftpd-3.0.3-lp150.5.3.1.x86_64.rpm
vsftpd-debuginfo-3.0.3-lp150.5.3.1.x86_64.rpm
vsftpd-debugsource-3.0.3-lp150.5.3.1.x86_64.rpm
vsftpd-3.0.3-lp150.5.3.1.i586.rpm
vsftpd-debuginfo-3.0.3-lp150.5.3.1.i586.rpm
vsftpd-debugsource-3.0.3-lp150.5.3.1.i586.rpm
openSUSE-2018-484
Recommended update for psmisc
moderate
openSUSE Leap 15.0 Update
This update for psmisc fixes the following issues:
- boo#1093665: fuser -m did not work for private mounts
psmisc-23.0-lp150.4.3.1.src.rpm
psmisc-23.0-lp150.4.3.1.x86_64.rpm
psmisc-debuginfo-23.0-lp150.4.3.1.x86_64.rpm
psmisc-debugsource-23.0-lp150.4.3.1.x86_64.rpm
psmisc-lang-23.0-lp150.4.3.1.noarch.rpm
psmisc-23.0-lp150.4.3.1.i586.rpm
psmisc-debuginfo-23.0-lp150.4.3.1.i586.rpm
psmisc-debugsource-23.0-lp150.4.3.1.i586.rpm
openSUSE-2018-482
Recommended update for snapper
moderate
openSUSE Leap 15.0 Update
This update for snapper fixes the following issues:
- boo#1092103: snapper printed a warning related to non-UTF8 locales.
The warning was moved to the documentation.
libsnapper-devel-0.5.4-lp150.3.3.1.x86_64.rpm
libsnapper4-0.5.4-lp150.3.3.1.x86_64.rpm
libsnapper4-debuginfo-0.5.4-lp150.3.3.1.x86_64.rpm
pam_snapper-0.5.4-lp150.3.3.1.x86_64.rpm
pam_snapper-debuginfo-0.5.4-lp150.3.3.1.x86_64.rpm
snapper-0.5.4-lp150.3.3.1.src.rpm
snapper-0.5.4-lp150.3.3.1.x86_64.rpm
snapper-debuginfo-0.5.4-lp150.3.3.1.x86_64.rpm
snapper-debugsource-0.5.4-lp150.3.3.1.x86_64.rpm
snapper-zypp-plugin-0.5.4-lp150.3.3.1.noarch.rpm
libsnapper-devel-0.5.4-lp150.3.3.1.i586.rpm
libsnapper4-0.5.4-lp150.3.3.1.i586.rpm
libsnapper4-debuginfo-0.5.4-lp150.3.3.1.i586.rpm
pam_snapper-0.5.4-lp150.3.3.1.i586.rpm
pam_snapper-debuginfo-0.5.4-lp150.3.3.1.i586.rpm
snapper-0.5.4-lp150.3.3.1.i586.rpm
snapper-debuginfo-0.5.4-lp150.3.3.1.i586.rpm
snapper-debugsource-0.5.4-lp150.3.3.1.i586.rpm
openSUSE-2018-481
Recommended update for issue-generator
moderate
openSUSE Leap 15.0 Update
This update for issue-generator fixes the following issues:
- boo#1085196: the /etc/issue file was replaced and agetty reloaded
even if there were no changes
issue-generator-1.5-lp150.3.3.1.noarch.rpm
issue-generator-1.5-lp150.3.3.1.src.rpm
openSUSE-2018-480
Recommended update for SUSEConnect
moderate
openSUSE Leap 15.0 Update
This update for SUSEConnect fixes the following issues:
- boo#1093658: SUSEConnect did not specify all run-time dependencies of the rmt-client-setup script
The following enhancement is included:
- Do not automatically register ecommended products that are not mirrored by the registration proxy
SUSEConnect-0.3.11-lp150.2.3.1.src.rpm
SUSEConnect-0.3.11-lp150.2.3.1.x86_64.rpm
openSUSE-2018-574
Recommended update for yast2-bootloader
important
openSUSE Leap 15.0 Update
This update for yast2-bootloader fixes the following issues:
- boo#1092417: MD RAID Disks were not listed in Guided Setup some complex setups that also contain physical partitions
- boo#1043029: Propose fips boot parameter if it is used for installation on s390
- Avoid "Invalid partition table" on GPT disks by properly setting pmbr flag (boo#1093887)
yast2-bootloader-4.0.35-lp150.2.5.1.src.rpm
yast2-bootloader-4.0.35-lp150.2.5.1.x86_64.rpm
yast2-bootloader-4.0.35-lp150.2.5.1.i586.rpm
openSUSE-2018-497
Recommended update for gcompris-qt
low
openSUSE Leap 15.0 Update
This recommended update for gcompris-qt fixes the following issue (boo#1093988):
- text corrections and translation updates
- UI position and element interaction corrections
- fixes to audio in several activities
- corrections and improvements to multiple activities
gcompris-qt-voices was updated to match.
gcompris-qt-voices-0~20180517-lp150.2.4.1.noarch.rpm
gcompris-qt-voices-0~20180517-lp150.2.4.1.src.rpm
gcompris-qt-0.91-lp150.3.3.1.src.rpm
gcompris-qt-0.91-lp150.3.3.1.x86_64.rpm
gcompris-qt-activities-0.91-lp150.3.3.1.noarch.rpm
gcompris-qt-debuginfo-0.91-lp150.3.3.1.x86_64.rpm
gcompris-qt-debugsource-0.91-lp150.3.3.1.x86_64.rpm
gcompris-qt-lang-0.91-lp150.3.3.1.noarch.rpm
openSUSE-2018-502
Recommended update for yast2-country
moderate
openSUSE Leap 15.0 Update
This update for yast2-country fixes the following issues:
- yast2 firstboot failed to run on a system with empty /etc/locale.conf (boo#1092979)
yast2-country-4.0.22-lp150.2.3.1.src.rpm
yast2-country-4.0.22-lp150.2.3.1.x86_64.rpm
yast2-country-data-4.0.22-lp150.2.3.1.x86_64.rpm
yast2-country-4.0.22-lp150.2.3.1.i586.rpm
yast2-country-data-4.0.22-lp150.2.3.1.i586.rpm
openSUSE-2018-501
Recommended update for yast2-storage-ng
moderate
openSUSE Leap 15.0 Update
This update for yast2-storage-ng fixes the following issues:
- more detailed description about the origin of the partitioning layout (boo#1089274)
- issues detecting of candidate disks for installation (boo#1091047)
- On Power9, 'No Operating System found' may have been printed after first boot (boo#1090019)
- several translation issues (boo#1081837, boo#1081601)
The following work-arounds are included:
- To consider MD RAIDs as BIOS RAIDs the environment variable LIBSTORAGE_MDPART can be used (boo#1092417)
yast2-storage-ng-4.0.183-lp150.2.3.1.src.rpm
yast2-storage-ng-4.0.183-lp150.2.3.1.x86_64.rpm
yast2-storage-ng-4.0.183-lp150.2.3.1.i586.rpm
openSUSE-2018-503
Recommended update for sbd
moderate
openSUSE Leap 15.0 Update
This update for updates sbd fixes the following issues:
- SBD did not log some important messages (boo#1091839)
- sbd-md failed to return an error if it failed to list any devices (boo#1086650)
sbd-1.3.1+20180507.e102d9e-lp150.2.3.1.src.rpm
sbd-1.3.1+20180507.e102d9e-lp150.2.3.1.x86_64.rpm
sbd-debuginfo-1.3.1+20180507.e102d9e-lp150.2.3.1.x86_64.rpm
sbd-debugsource-1.3.1+20180507.e102d9e-lp150.2.3.1.x86_64.rpm
openSUSE-2018-504
Recommended update for yast2-packager
moderate
openSUSE Leap 15.0 Update
This update for yast2-packager fixes the following issues:
- The YaST2 Packager module could not be started from the programs menus (boo#1087352)
yast2-packager-4.0.62-lp150.2.3.1.src.rpm
yast2-packager-4.0.62-lp150.2.3.1.x86_64.rpm
yast2-packager-4.0.62-lp150.2.3.1.i586.rpm
openSUSE-2018-508
Recommended update for cloud-init
moderate
openSUSE Leap 15.0 Update
This update for cloud-init fixes the following issues:
- issues in cloud-init locating datasources (boo#1089824, boo#1093501)
cloud-init-18.2-lp150.2.3.1.src.rpm
cloud-init-18.2-lp150.2.3.1.x86_64.rpm
cloud-init-config-suse-18.2-lp150.2.3.1.x86_64.rpm
cloud-init-doc-18.2-lp150.2.3.1.x86_64.rpm
openSUSE-2018-524
Recommended update for libu2f-host, pam_u2f
moderate
openSUSE Leap 15.0 Update
This update for libu2f-host, pam_u2f fixes the following issues:
- Various bug fixes in libu2f 1.1.6, including added udev rules for more devices (boo#1094622)
- Various bug fixes in pam_u2f 1.0.7, including an issue when using syslog as a debug facility (boo#1094622)
libu2f-host-1.1.6-lp150.2.3.1.src.rpm
libu2f-host-debuginfo-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host-debugsource-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host-devel-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host-doc-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host0-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host0-debuginfo-1.1.6-lp150.2.3.1.x86_64.rpm
u2f-host-1.1.6-lp150.2.3.1.x86_64.rpm
u2f-host-debuginfo-1.1.6-lp150.2.3.1.x86_64.rpm
pam_u2f-1.0.7-lp150.2.3.1.src.rpm
pam_u2f-1.0.7-lp150.2.3.1.x86_64.rpm
pam_u2f-debuginfo-1.0.7-lp150.2.3.1.x86_64.rpm
pam_u2f-debugsource-1.0.7-lp150.2.3.1.x86_64.rpm
openSUSE-2018-506
Recommended update for yast2-installation
moderate
openSUSE Leap 15.0 Update
This update for yast2-installation fixes the following issues:
- Attempts to set read-only property to default BTRFS subvolume failed if the filesystem already existed on disk (boo#1091047)
- Unmounting a filesystem may after installation/upgrade, log a warning (boo#1090018)
yast2-installation-4.0.60-lp150.2.3.1.noarch.rpm
yast2-installation-4.0.60-lp150.2.3.1.src.rpm
openSUSE-2018-525
Recommended update for python-kiwi
moderate
openSUSE Leap 15.0 Update
This updates python-kiwi to version 9.15.1 fixing the following issues:
* Fix zypper add lock operations
* Make container compression a configuration option
* Return file name after archive or compression call
* Allow docker root import from uncompressed file
* Add uninstall pacakges type
* Some simple code cleaning
dracut-kiwi-lib-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-live-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-oem-dump-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-oem-repart-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-overlay-9.15.2-lp150.2.3.1.x86_64.rpm
kiwi-man-pages-9.15.2-lp150.2.3.1.x86_64.rpm
kiwi-pxeboot-9.15.2-lp150.2.3.1.x86_64.rpm
kiwi-tools-9.15.2-lp150.2.3.1.x86_64.rpm
kiwi-tools-debuginfo-9.15.2-lp150.2.3.1.x86_64.rpm
python-kiwi-9.15.2-lp150.2.3.1.src.rpm
python-kiwi-debugsource-9.15.2-lp150.2.3.1.x86_64.rpm
python2-kiwi-9.15.2-lp150.2.3.1.x86_64.rpm
python3-kiwi-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-lib-9.15.2-lp150.2.3.1.i586.rpm
dracut-kiwi-live-9.15.2-lp150.2.3.1.i586.rpm
dracut-kiwi-oem-dump-9.15.2-lp150.2.3.1.i586.rpm
dracut-kiwi-oem-repart-9.15.2-lp150.2.3.1.i586.rpm
dracut-kiwi-overlay-9.15.2-lp150.2.3.1.i586.rpm
kiwi-man-pages-9.15.2-lp150.2.3.1.i586.rpm
kiwi-pxeboot-9.15.2-lp150.2.3.1.i586.rpm
kiwi-tools-9.15.2-lp150.2.3.1.i586.rpm
kiwi-tools-debuginfo-9.15.2-lp150.2.3.1.i586.rpm
python-kiwi-debugsource-9.15.2-lp150.2.3.1.i586.rpm
python2-kiwi-9.15.2-lp150.2.3.1.i586.rpm
python3-kiwi-9.15.2-lp150.2.3.1.i586.rpm
openSUSE-2018-507
Recommended update for yast2-pkg-bindings
moderate
openSUSE Leap 15.0 Update
This update for yast2-pkg-bindings fixes the following issue:
- Errors when refreshing the zypp-plugin-spacewalk service on a system not managed by spacewalk (boo#1086768)
yast2-pkg-bindings-devel-doc-4.0.10-lp150.2.3.1.noarch.rpm
yast2-pkg-bindings-devel-doc-4.0.10-lp150.2.3.1.src.rpm
yast2-pkg-bindings-4.0.10-lp150.2.3.1.src.rpm
yast2-pkg-bindings-4.0.10-lp150.2.3.1.x86_64.rpm
yast2-pkg-bindings-debuginfo-4.0.10-lp150.2.3.1.x86_64.rpm
yast2-pkg-bindings-debugsource-4.0.10-lp150.2.3.1.x86_64.rpm
yast2-pkg-bindings-4.0.10-lp150.2.3.1.i586.rpm
yast2-pkg-bindings-debuginfo-4.0.10-lp150.2.3.1.i586.rpm
yast2-pkg-bindings-debugsource-4.0.10-lp150.2.3.1.i586.rpm
openSUSE-2018-500
Recommended update for fence-agents
moderate
openSUSE Leap 15.0 Update
This update for fence-agents fixes the following issues:
- Fence_sbd failed to start, an issue related to Python 3 encoding (boo#1082871)
fence-agents-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.src.rpm
fence-agents-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm
fence-agents-debuginfo-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm
fence-agents-debugsource-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm
fence-agents-devel-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm
openSUSE-2018-505
Recommended update for patterns-base
moderate
openSUSE Leap 15.0 Update
This update for patterns-base fixes the following issues:
- x11 pattern corrections (boo#1086663)
- terminfo was missing from the minimal_base pattern (boo#1081747)
- bootloader variants were listed in patterns (boo#1064265)
patterns-base-20171206-lp150.15.3.1.src.rpm
patterns-base-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-apparmor-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-apparmor-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-apparmor_opt-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-base-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-base-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-basesystem-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-console-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-documentation-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-enhanced_base-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-enhanced_base-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-enhanced_base_opt-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-minimal_base-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-minimal_base-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-sw_management-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-sw_management-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-transactional_base-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-update_test-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11_enhanced-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11_enhanced-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11_opt-20171206-lp150.15.3.1.x86_64.rpm
openSUSE-2018-526
Recommended update for google-compute-engine
moderate
openSUSE Leap 15.0 Update
This update brings google-compute-engine to version 20180510, fixing the following issues:
* Prevent delay in configuring IP forwarding routes.
* Include new google-network-daemon
* Add google-network-daemon.suse init script for SysV
* Stop shipping deprecated google-ip-forwarding-daemon service
* Install google_oslogin_nss_cache binary into oslogin package
* Include libnss cache as part of the OS Login package.
* Fix conflict with other applications that use curl and SSL.
google-compute-engine-20180510-lp150.2.3.1.src.rpm
google-compute-engine-init-20180510-lp150.2.3.1.noarch.rpm
google-compute-engine-oslogin-20180510-lp150.2.3.1.x86_64.rpm
google-compute-engine-oslogin-debuginfo-20180510-lp150.2.3.1.x86_64.rpm
google-compute-engine-oslogin-20180510-lp150.2.3.1.i586.rpm
google-compute-engine-oslogin-32bit-20180510-lp150.2.3.1.x86_64.rpm
google-compute-engine-oslogin-32bit-debuginfo-20180510-lp150.2.3.1.x86_64.rpm
google-compute-engine-oslogin-debuginfo-20180510-lp150.2.3.1.i586.rpm
openSUSE-2018-498
Recommended update for bind
moderate
openSUSE Leap 15.0 Update
This update for bind fixes the following issues:
- boo#1093338: bind-chrootenv contained some chroot related files in error
- boo#1092283: bind created /etc/rndc.key during installation instead of during first boot
bind-9.11.2-lp150.8.3.1.src.rpm
bind-9.11.2-lp150.8.3.1.x86_64.rpm
bind-chrootenv-9.11.2-lp150.8.3.1.x86_64.rpm
bind-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
bind-debugsource-9.11.2-lp150.8.3.1.x86_64.rpm
bind-devel-9.11.2-lp150.8.3.1.x86_64.rpm
bind-doc-9.11.2-lp150.8.3.1.noarch.rpm
bind-lwresd-9.11.2-lp150.8.3.1.x86_64.rpm
bind-lwresd-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
bind-utils-9.11.2-lp150.8.3.1.x86_64.rpm
bind-utils-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libbind9-160-9.11.2-lp150.8.3.1.x86_64.rpm
libbind9-160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libdns169-9.11.2-lp150.8.3.1.x86_64.rpm
libdns169-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libirs-devel-9.11.2-lp150.8.3.1.x86_64.rpm
libirs160-9.11.2-lp150.8.3.1.x86_64.rpm
libirs160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisc166-9.11.2-lp150.8.3.1.x86_64.rpm
libisc166-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisccc160-9.11.2-lp150.8.3.1.x86_64.rpm
libisccc160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisccfg160-9.11.2-lp150.8.3.1.x86_64.rpm
libisccfg160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
liblwres160-9.11.2-lp150.8.3.1.x86_64.rpm
liblwres160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
python3-bind-9.11.2-lp150.8.3.1.noarch.rpm
bind-9.11.2-lp150.8.3.1.i586.rpm
bind-chrootenv-9.11.2-lp150.8.3.1.i586.rpm
bind-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
bind-debugsource-9.11.2-lp150.8.3.1.i586.rpm
bind-devel-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
bind-devel-9.11.2-lp150.8.3.1.i586.rpm
bind-lwresd-9.11.2-lp150.8.3.1.i586.rpm
bind-lwresd-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
bind-utils-9.11.2-lp150.8.3.1.i586.rpm
bind-utils-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libbind9-160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libbind9-160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libbind9-160-9.11.2-lp150.8.3.1.i586.rpm
libbind9-160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libdns169-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libdns169-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libdns169-9.11.2-lp150.8.3.1.i586.rpm
libdns169-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libirs-devel-9.11.2-lp150.8.3.1.i586.rpm
libirs160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libirs160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libirs160-9.11.2-lp150.8.3.1.i586.rpm
libirs160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libisc166-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libisc166-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisc166-9.11.2-lp150.8.3.1.i586.rpm
libisc166-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libisccc160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libisccc160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisccc160-9.11.2-lp150.8.3.1.i586.rpm
libisccc160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libisccfg160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libisccfg160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisccfg160-9.11.2-lp150.8.3.1.i586.rpm
libisccfg160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
liblwres160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
liblwres160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
liblwres160-9.11.2-lp150.8.3.1.i586.rpm
liblwres160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
openSUSE-2018-527
Recommended update for openmpi2
low
openSUSE Leap 15.0 Update
This update for openmpi2 fixes the following issues:
- boo#1092257: Support for QLogic Corp. FastLinQ QL41000 was missing
libopenmpi2-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm
libopenmpi_2_1_3-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm
libopenmpi_2_1_3-gnu-hpc-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-gnu-hpc-devel-2.1.3-lp150.3.3.1.noarch.rpm
openmpi2-gnu-hpc-devel-static-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-gnu-hpc-docs-2.1.3-lp150.3.3.1.noarch.rpm
openmpi2-gnu-hpc-macros-devel-2.1.3-lp150.3.3.1.noarch.rpm
openmpi_2_1_3-gnu-hpc-2.1.3-lp150.3.3.1.src.rpm
openmpi_2_1_3-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-debugsource-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-devel-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-devel-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-devel-static-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-docs-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-macros-devel-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-testsuite-2.1.3-lp150.3.3.1.noarch.rpm
openmpi_2_1_3-gnu-hpc-testsuite-2.1.3-lp150.3.3.1.src.rpm
openmpi2-2.1.3-lp150.3.3.1.src.rpm
openmpi2-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-config-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-debugsource-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-devel-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-devel-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-docs-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-libs-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-libs-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-testsuite-2.1.3-lp150.3.3.1.noarch.rpm
openmpi2-testsuite-2.1.3-lp150.3.3.1.src.rpm
openSUSE-2018-499
Recommended update for patterns-lxqt
moderate
openSUSE Leap 15.0 Update
This update for patterns-lxqt fixes the following issues:
- The LXQt pattern unnecessarily required some XFCE packages (boo#1094025)
patterns-lxqt-20170319-lp150.2.3.1.src.rpm
patterns-lxqt-lxqt-20170319-lp150.2.3.1.x86_64.rpm
openSUSE-2018-528
Recommended update for virtualbox
moderate
openSUSE Leap 15.0 Update
This recommended to virtualbox to version 5.2.12 (boo#1094158) resolves the following issues:
- Serial: fixed possible data corruption when sending data under certain circumstances
- Video recording: fixed starting / stopping recording under certain circumstances
- Linux guests: support Linux 4.16 and EL 7.5 kernels
- Linux guests: 3D fixes for recent guests
The following tracked build fix is included:
- boo#1093731: Fix build errors with Qt 5.11
python2-virtualbox-5.2.12-lp150.4.3.1.x86_64.rpm
python2-virtualbox-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-5.2.12-lp150.4.3.1.src.rpm
virtualbox-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-debugsource-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-devel-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-guest-desktop-icons-5.2.12-lp150.4.3.1.noarch.rpm
virtualbox-guest-kmp-default-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm
virtualbox-guest-kmp-default-debuginfo-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm
virtualbox-guest-source-5.2.12-lp150.4.3.1.noarch.rpm
virtualbox-guest-tools-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-guest-tools-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-guest-x11-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-guest-x11-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-host-kmp-default-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm
virtualbox-host-kmp-default-debuginfo-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm
virtualbox-host-source-5.2.12-lp150.4.3.1.noarch.rpm
virtualbox-qt-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-qt-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-vnc-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-websrv-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-websrv-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
openSUSE-2018-495
Security update for enigmail
moderate
openSUSE Leap 15.0 Update
This update for enigmail to version 2.0.5 fixes the following issues:
Improvements on previous fixes on CVE-2017-17688, boo#1093151 and CVE-2017-17689, boo#1093152 (EFAIL):
- do not decrypt MIME parts unnecessarily
- improve Error Message for Missing Message Modification Code
enigmail-2.0.5-lp150.2.6.1.src.rpm
enigmail-2.0.5-lp150.2.6.1.x86_64.rpm
openSUSE-2018-535
Security update for enigmail
moderate
openSUSE Leap 15.0 Update
This update for enigmail to version 2.0.6 fixes the following issues:
Security issues fixed:
- Replies to a partially encrypted message may have revealed protected information:
no longer display PGP/MIME message part followed by unencrypted data (boo#1094781)
- Signature could be spoofed via Inline-PGP in HTML Mails
The following bugs were fixed:
- Filter actions could forget selected mail folder names
enigmail-2.0.6-lp150.2.9.1.src.rpm
enigmail-2.0.6-lp150.2.9.1.x86_64.rpm
openSUSE-2018-518
Recommended update for GraphicsMagick
moderate
openSUSE Leap 15.0 Update
GraphicsMagick was updated to 1.3.29:
* Security Fixes:
- GraphicsMagick is now participating in Google's oss-fuzz project
- JNG: Require that the embedded JPEG image have the same dimensions
as the JNG image as provided by JHDR. Avoids a heap write overflow.
- MNG: Arbitrarily limit the number of loops which may be requested by
the MNG LOOP chunk to 512 loops, and provide the '-define
mng:maximum-loops=value' option in case the user wants to change the
limit. This fixes a denial of service caused by large LOOP
specifications.
* Bug fixes:
- DICOM: Pre/post rescale functions are temporarily disabled (until
the implementation is fixed).
- JPEG: Fix regression in last release in which reading some JPEG
files produces the error "Improper call to JPEG library in state
201".
- ICON: Some DIB-based Windows ICON files were reported as corrupt to
an unexpectedly missing opacity mask image.
- In-memory Blob I/O: Don't implicitly increase the allocation size
due to seek offsets.
- MNG: Detect and handle failure to allocate global PLTE. Fix divide
by zero.
- DrawGetStrokeDashArray(): Check for failure to allocate memory.
- BlobToImage(): Now produces useful exception reports to cover the
cases where 'magick' was not set and the file format could not be
deduced from its header.
* API Updates:
- Wand API: Added MagickIsPaletteImage(), MagickIsOpaqueImage(),
MagickIsMonochromeImage(), MagickIsGrayImage(), MagickHasColormap()
based on contributions by Troy Patteson.
- New structure ImageExtra added and Image 'clip_mask' member is
replaced by 'extra' which points to private ImageExtra allocation.
The ImageGetClipMask() function now provides access to the clip mask
image.
- New structure DrawInfoExtra and DrawInfo 'clip_path' is replaced by
'extra' which points to private DrawInfoExtra allocation. The
DrawInfoGetClipPath() function now provides access to the clip path.
- New core library functions: GetImageCompositeMask(),
CompositeMaskImage(), CompositePathImage(), SetImageCompositeMask(),
ImageGetClipMask(), ImageGetCompositeMask(), DrawInfoGetClipPath(),
DrawInfoGetCompositePath()
- Deprecated core library functions: RegisterStaticModules(),
UnregisterStaticModules().
* Feature improvements:
- Static modules (in static library or shared library without
dynamically loadable modules) are now lazy-loaded using the same
external interface as the lazy-loader for dynamic modules. This
results in more similarity between the builds and reduces the fixed
initialization overhead by only initializing the modules which are
used.
- SVG: The quality of SVG support has been significantly improved due
to the efforts of Greg Wolfe.
- FreeType/TTF rendering: Rendering fixes for opacity.
GraphicsMagick-1.3.29-lp150.3.3.1.src.rpm
GraphicsMagick-1.3.29-lp150.3.3.1.x86_64.rpm
GraphicsMagick-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
GraphicsMagick-debugsource-1.3.29-lp150.3.3.1.x86_64.rpm
GraphicsMagick-devel-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick++-Q16-12-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick++-Q16-12-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick++-devel-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick-Q16-3-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick-Q16-3-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick3-config-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagickWand-Q16-2-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagickWand-Q16-2-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
perl-GraphicsMagick-1.3.29-lp150.3.3.1.x86_64.rpm
perl-GraphicsMagick-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
openSUSE-2018-515
Security update for the Linux Kernel
important
openSUSE Leap 15.0 Update
The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3639: Systems with microprocessors utilizing speculative
execution and speculative execution of memory reads before the addresses
of all prior memory writes are known may allow unauthorized disclosure
of information to an attacker with local user access via a side-channel
analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1087082).
A new boot commandline option was introduced,
"spec_store_bypass_disable", which can have following values:
- auto: Kernel detects whether your CPU model contains an implementation
of Speculative Store Bypass and picks the most appropriate mitigation.
- on: disable Speculative Store Bypass
- off: enable Speculative Store Bypass
- prctl: Control Speculative Store Bypass per thread via
prctl. Speculative Store Bypass is enabled for a process by default. The
state of the control is inherited on fork.
- seccomp: Same as "prctl" above, but all seccomp threads will disable
SSB unless they explicitly opt out.
The default is "seccomp", meaning programs need explicit opt-in into the mitigation.
Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:
- "Vulnerable"
- "Mitigation: Speculative Store Bypass disabled"
- "Mitigation: Speculative Store Bypass disabled via prctl"
- "Mitigation: Speculative Store Bypass disabled via prctl and seccomp"
The following non-security bugs were fixed:
- allow_unsupported: add module tainting on feature use (FATE#323394).
- powerpc/64/kexec: fix race in kexec when XIVE is shutdown (bsc#1088273).
- reiserfs: mark read-write mode unsupported (FATE#323394).
- reiserfs: package in separate KMP (FATE#323394).
kernel-debug-4.12.14-lp150.12.4.1.nosrc.rpm
True
kernel-debug-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-base-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-base-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-devel-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-devel-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-4.12.14-lp150.12.4.1.nosrc.rpm
True
kernel-default-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-base-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-base-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-devel-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-devel-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-docs-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-docs-4.12.14-lp150.12.4.1.nosrc.rpm
True
kernel-docs-html-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-kvmsmall-4.12.14-lp150.12.4.1.nosrc.rpm
True
kernel-kvmsmall-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-base-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-devel-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-obs-build-4.12.14-lp150.12.4.1.src.rpm
True
kernel-obs-build-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-obs-build-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-obs-qa-4.12.14-lp150.12.4.1.src.rpm
True
kernel-obs-qa-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-devel-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-macros-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-source-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-source-4.12.14-lp150.12.4.1.src.rpm
True
kernel-source-vanilla-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-syms-4.12.14-lp150.12.4.1.src.rpm
True
kernel-syms-4.12.14-lp150.12.4.1.x86_64.rpm
True
openSUSE-2018-520
Security update for wireshark
moderate
openSUSE Leap 15.0 Update
This update for wireshark fixes the following issues:
Minor vulnerabilities that could be used to trigger dissector crashes or
cause excessive memory use by making Wireshark read specially crafted
packages from the network or capture files (boo#1094301):
- CVE-2018-11356: DNS dissector crash
- CVE-2018-11357: Multiple dissectors could consume excessive memory
- CVE-2018-11358: Q.931 dissector crash
- CVE-2018-11359: The RRC dissector and other dissectors could crash
- CVE-2018-11360: GSM A DTAP dissector crash
- CVE-2018-11362: LDSS dissector crash
This update to version 2.4.7 also contains bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.4.7.html
libwireshark9-2.4.7-lp150.2.3.1.x86_64.rpm
libwireshark9-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
libwiretap7-2.4.7-lp150.2.3.1.x86_64.rpm
libwiretap7-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
libwscodecs1-2.4.7-lp150.2.3.1.x86_64.rpm
libwscodecs1-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
libwsutil8-2.4.7-lp150.2.3.1.x86_64.rpm
libwsutil8-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-2.4.7-lp150.2.3.1.src.rpm
wireshark-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-debugsource-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-devel-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-ui-qt-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-ui-qt-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
openSUSE-2018-521
Recommended update for gajim, python-nbxmpp
low
openSUSE Leap 15.0 Update
This update for gajim and python-nbxmpp fixes the following issues:
- gajim plugin installer did not work correctly due to being unable to locate required certificates (boo#1094343)
- python-nbxmpp did not have the correct, dependent version, causes gajium crashes on start-up (boo#1093009)
gajim-1.0.3-lp150.3.3.1.noarch.rpm
gajim-1.0.3-lp150.3.3.1.src.rpm
gajim-lang-1.0.3-lp150.3.3.1.noarch.rpm
python-nbxmpp-0.6.6-lp150.2.3.1.src.rpm
python2-nbxmpp-0.6.6-lp150.2.3.1.noarch.rpm
python2-nbxmpp-doc-0.6.6-lp150.2.3.1.noarch.rpm
python3-nbxmpp-0.6.6-lp150.2.3.1.noarch.rpm
python3-nbxmpp-doc-0.6.6-lp150.2.3.1.noarch.rpm
openSUSE-2018-545
Optional update for firewalld
low
openSUSE Leap 15.0 Update
This update for firewalld fixes the following issues:
- minor translation updates and typo fixes (boo#1094051)
firewall-applet-0.5.3-lp150.2.3.1.noarch.rpm
firewall-config-0.5.3-lp150.2.3.1.noarch.rpm
firewall-macros-0.5.3-lp150.2.3.1.noarch.rpm
firewalld-0.5.3-lp150.2.3.1.noarch.rpm
firewalld-0.5.3-lp150.2.3.1.src.rpm
firewalld-lang-0.5.3-lp150.2.3.1.noarch.rpm
python3-firewall-0.5.3-lp150.2.3.1.noarch.rpm
openSUSE-2018-532
Security update for pdns
moderate
openSUSE Leap 15.0 Update
This update for pdns fixes the following issues:
Security issues fixed:
- CVE-2018-1046: Fix an issue with replaying a specially crafted PCAP file that can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution (bsc#1092540).
pdns-4.1.2-lp150.3.3.1.src.rpm
pdns-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-geoip-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-geoip-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-godbc-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-godbc-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-ldap-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-ldap-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-lua-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-lua-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-mydns-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-mydns-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-mysql-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-mysql-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-postgresql-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-postgresql-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-remote-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-remote-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-sqlite3-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-sqlite3-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-debugsource-4.1.2-lp150.3.3.1.x86_64.rpm
openSUSE-2018-536
Recommended update for live-net-installer
moderate
openSUSE Leap 15.0 Update
This update for live-net-installer fixes the following issues:
- Fixes installation from GNOME live media (boo#1094842)
live-net-installer-1.0-lp150.3.3.1.noarch.rpm
live-net-installer-1.0-lp150.3.3.1.src.rpm
openSUSE-2018-537
Recommended update for fate
moderate
openSUSE Leap 15.0 Update
This update for fate fixes the following issues:
- New or imported features are sometimes not shown/editable (bsc#1094520)
- explicitely select feature if it is the first one (bsc#1081921)
- various ECO related improvements (bsc#1080586)
- Prefs could have invalid Products (bsc#1088478)
fate-1.6.0.5-lp150.2.3.1.src.rpm
fate-1.6.0.5-lp150.2.3.1.x86_64.rpm
fate-debuginfo-1.6.0.5-lp150.2.3.1.x86_64.rpm
openSUSE-2018-554
Optional update for geotiff
moderate
openSUSE Leap 15.0 Update
This update for geotiff fixes the following issues:
- Incorrect path for library in .pc file of devel subpackage (boo#1094802)
geotiff-1.4.2-lp150.2.3.1.src.rpm
geotiff-1.4.2-lp150.2.3.1.x86_64.rpm
geotiff-debuginfo-1.4.2-lp150.2.3.1.x86_64.rpm
geotiff-debugsource-1.4.2-lp150.2.3.1.x86_64.rpm
geotiff-devel-1.4.2-lp150.2.3.1.x86_64.rpm
libgeotiff2-1.4.2-lp150.2.3.1.x86_64.rpm
libgeotiff2-debuginfo-1.4.2-lp150.2.3.1.x86_64.rpm
openSUSE-2018-566
Recommended update for shim
low
openSUSE Leap 15.0 Update
This update for shim fixes the following issues:
- Show a countdown menu before reset. (bsc#1092000)
shim-14-lp150.8.5.1.src.rpm
shim-14-lp150.8.5.1.x86_64.rpm
shim-debuginfo-14-lp150.8.5.1.x86_64.rpm
shim-debugsource-14-lp150.8.5.1.x86_64.rpm
openSUSE-2018-555
Recommended update for syncthing
moderate
openSUSE Leap 15.0 Update
This update for syncthing fixes the following issue:
- Syncthing attempted to update itself, which is not in line with distribution policy (boo#1095169)
syncthing-0.14.46-lp150.3.3.1.src.rpm
syncthing-0.14.46-lp150.3.3.1.x86_64.rpm
openSUSE-2018-556
Recommended update for xfce4-branding-openSUSE
low
openSUSE Leap 15.0 Update
This update for xfce4-branding-openSUSE fixes the following issues:
- XFCE branding was incorrect (boo#1095192)
exo-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
libgarcon-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
libxfce4ui-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
midori-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
openSUSE-xfce-icon-theme-4.12.0-lp150.5.3.1.noarch.rpm
thunar-volman-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-branding-openSUSE-4.12.0-lp150.5.3.1.src.rpm
xfce4-notifyd-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-panel-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-power-manager-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-session-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-settings-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfdesktop-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfwm4-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
openSUSE-2018-557
Security update for git
important
openSUSE Leap 15.0 Update
This update for fixes the following security issues:
* path sanity-checks on NTFS can read arbitrary memory (CVE-2018-11233,
boo#1095218)
* arbitrary code execution when recursively cloning a malicious repository
(CVE-2018-11235, boo#1095219)
git-2.16.4-lp150.2.3.1.src.rpm
git-2.16.4-lp150.2.3.1.x86_64.rpm
git-arch-2.16.4-lp150.2.3.1.x86_64.rpm
git-core-2.16.4-lp150.2.3.1.x86_64.rpm
git-core-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-credential-gnome-keyring-2.16.4-lp150.2.3.1.x86_64.rpm
git-credential-gnome-keyring-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-credential-libsecret-2.16.4-lp150.2.3.1.x86_64.rpm
git-credential-libsecret-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-cvs-2.16.4-lp150.2.3.1.x86_64.rpm
git-daemon-2.16.4-lp150.2.3.1.x86_64.rpm
git-daemon-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-debugsource-2.16.4-lp150.2.3.1.x86_64.rpm
git-doc-2.16.4-lp150.2.3.1.noarch.rpm
git-email-2.16.4-lp150.2.3.1.x86_64.rpm
git-gui-2.16.4-lp150.2.3.1.x86_64.rpm
git-p4-2.16.4-lp150.2.3.1.x86_64.rpm
git-svn-2.16.4-lp150.2.3.1.x86_64.rpm
git-svn-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-web-2.16.4-lp150.2.3.1.x86_64.rpm
gitk-2.16.4-lp150.2.3.1.x86_64.rpm
git-2.16.4-lp150.2.3.1.i586.rpm
git-arch-2.16.4-lp150.2.3.1.i586.rpm
git-core-2.16.4-lp150.2.3.1.i586.rpm
git-core-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-credential-gnome-keyring-2.16.4-lp150.2.3.1.i586.rpm
git-credential-gnome-keyring-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-credential-libsecret-2.16.4-lp150.2.3.1.i586.rpm
git-credential-libsecret-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-cvs-2.16.4-lp150.2.3.1.i586.rpm
git-daemon-2.16.4-lp150.2.3.1.i586.rpm
git-daemon-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-debugsource-2.16.4-lp150.2.3.1.i586.rpm
git-email-2.16.4-lp150.2.3.1.i586.rpm
git-gui-2.16.4-lp150.2.3.1.i586.rpm
git-p4-2.16.4-lp150.2.3.1.i586.rpm
git-svn-2.16.4-lp150.2.3.1.i586.rpm
git-svn-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-web-2.16.4-lp150.2.3.1.i586.rpm
gitk-2.16.4-lp150.2.3.1.i586.rpm
openSUSE-2018-548
Recommended update for kglobalaccel
moderate
openSUSE Leap 15.0 Update
This update for kglobalaccel fixes the following issues:
- Task switcher was randomly ignored, the user had to pres ALT-TAB several times
to activate it (kde#394689, boo#1094931)
kglobalaccel-5.45.0-lp150.2.3.1.src.rpm
kglobalaccel-debugsource-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel-devel-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel5-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel5-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-lang-5.45.0-lp150.2.3.1.noarch.rpm
libKF5GlobalAccelPrivate5-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccelPrivate5-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel-debugsource-5.45.0-lp150.2.3.1.i586.rpm
kglobalaccel-devel-32bit-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel-devel-5.45.0-lp150.2.3.1.i586.rpm
kglobalaccel5-5.45.0-lp150.2.3.1.i586.rpm
kglobalaccel5-debuginfo-5.45.0-lp150.2.3.1.i586.rpm
libKF5GlobalAccel5-32bit-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-32bit-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-5.45.0-lp150.2.3.1.i586.rpm
libKF5GlobalAccel5-debuginfo-5.45.0-lp150.2.3.1.i586.rpm
libKF5GlobalAccelPrivate5-5.45.0-lp150.2.3.1.i586.rpm
libKF5GlobalAccelPrivate5-debuginfo-5.45.0-lp150.2.3.1.i586.rpm
openSUSE-2018-561
Recommended update for plasma5-pk-updates
low
openSUSE Leap 15.0 Update
This update for plasma5-pk-updates fixes the following issues:
- boo#1093743: Some Italian translations were missing
plasma5-pk-updates-0.3.2-lp150.9.3.1.src.rpm
plasma5-pk-updates-0.3.2-lp150.9.3.1.x86_64.rpm
plasma5-pk-updates-debuginfo-0.3.2-lp150.9.3.1.x86_64.rpm
plasma5-pk-updates-debugsource-0.3.2-lp150.9.3.1.x86_64.rpm
plasma5-pk-updates-lang-0.3.2-lp150.9.3.1.noarch.rpm
openSUSE-2018-596
Security update for prosody
moderate
openSUSE Leap 15.0 Update
This update for prosody to version 0.10.2 fixes the following issues:
This security issue was fixed:
- CVE-2018-10847: Prevent insufficient validation of client-provided parameters
during XMPP stream restarts. Authenticated users may have overriden the realm
associated with their session, potentially bypassing security policies and
allowing impersonation (bsc#1094890).
These non-security issues were fixed:
- mod_websocket: Store the request object on the session for use by other modules
- mod_c2s: Avoid concatenating potential nil value
- core.certmanager: Allow all non-whitespace in service name
- mod_disco: Skip code specific to disco on user accounts
- mod_bosh: Store the normalized hostname on session
- MUC: Fix error logged when no persistent rooms present
prosody-0.10.2-lp150.3.6.2.src.rpm
prosody-0.10.2-lp150.3.6.2.x86_64.rpm
prosody-debuginfo-0.10.2-lp150.3.6.2.x86_64.rpm
prosody-debugsource-0.10.2-lp150.3.6.2.x86_64.rpm
openSUSE-2018-562
Recommended update for syslog-ng
moderate
openSUSE Leap 15.0 Update
This update for syslog-ng fixes the following issue:
- syslog-ng did not start when network was not yet running during boot (boo#1077975)
libevtlog-3_14-0-3.14.1-lp150.2.3.1.x86_64.rpm
libevtlog-3_14-0-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-3.14.1-lp150.2.3.1.src.rpm
syslog-ng-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-curl-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-curl-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-debugsource-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-devel-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-geoip-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-geoip-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-python-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-python-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-redis-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-redis-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-smtp-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-smtp-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-sql-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-sql-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
openSUSE-2018-563
Recommended update for blender
low
openSUSE Leap 15.0 Update
This update for blender fixes the following issues:
- Missing cycles headers causing broken GPU rendering with i.e CUDA (boo#1094777)
blender-2.79b-lp150.2.3.1.src.rpm
blender-2.79b-lp150.2.3.1.x86_64.rpm
blender-debuginfo-2.79b-lp150.2.3.1.x86_64.rpm
blender-debugsource-2.79b-lp150.2.3.1.x86_64.rpm
blender-devel-2.79b-lp150.2.3.1.noarch.rpm
blender-lang-2.79b-lp150.2.3.1.noarch.rpm
openSUSE-2018-565
Recommended update for fvwm2
low
openSUSE Leap 15.0 Update
This update for fvwm2 fixes the following issues:
Use update-alternatives for desktop selection (boo#1080494)
fvwm2-2.6.7-lp150.2.3.1.src.rpm
fvwm2-2.6.7-lp150.2.3.1.x86_64.rpm
fvwm2-debuginfo-2.6.7-lp150.2.3.1.x86_64.rpm
fvwm2-debugsource-2.6.7-lp150.2.3.1.x86_64.rpm
openSUSE-2018-599
Security update for xen
important
openSUSE Leap 15.0 Update
This update for xen to version 4.10.1 fixes several issues (bsc#1027519).
These security issues were fixed:
- CVE-2018-3639: Prevent attackers with local user access from extracting
information via a side-channel analysis, aka Speculative Store Bypass (SSB),
Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations
(bsc#1074562).
This non-security issue was fixed:
- Always call qemus xen-save-devices-state in suspend/resume to
fix migration with qcow2 images (bsc#1079730)
xen-4.10.1_04-lp150.2.3.1.src.rpm
xen-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-debugsource-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-devel-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-doc-html-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-libs-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-libs-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-tools-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-tools-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-tools-domU-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-tools-domU-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-debugsource-4.10.1_04-lp150.2.3.1.i586.rpm
xen-devel-4.10.1_04-lp150.2.3.1.i586.rpm
xen-libs-32bit-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-libs-32bit-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-libs-4.10.1_04-lp150.2.3.1.i586.rpm
xen-libs-debuginfo-4.10.1_04-lp150.2.3.1.i586.rpm
xen-tools-domU-4.10.1_04-lp150.2.3.1.i586.rpm
xen-tools-domU-debuginfo-4.10.1_04-lp150.2.3.1.i586.rpm
openSUSE-2018-598
Security update for ImageMagick
moderate
openSUSE Leap 15.0 Update
This update for ImageMagick to version 7.0.7-34 fixes the following issues:
The following security issue was fixed:
- Fixed numerous use of uninitialized values, integer overflow, memory exceeded, and timeouts.
The following non-security issues were fixed:
- Added support for reading eXIf chunks to the PNG coder.
- Improved clip / composite mask handling.
- Restore SetImageAlpha() behavior.
- Fix -clip and -mask options.
- Missing break when checking "compliance" element.
ImageMagick-7.0.7.34-lp150.2.3.1.src.rpm
ImageMagick-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-debugsource-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-devel-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-doc-7.0.7.34-lp150.2.3.1.noarch.rpm
ImageMagick-extra-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-extra-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-7_Q16HDRI4-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-devel-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickCore-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickWand-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
perl-PerlMagick-7.0.7.34-lp150.2.3.1.x86_64.rpm
perl-PerlMagick-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-debugsource-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-devel-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-devel-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-extra-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-extra-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-7_Q16HDRI4-7.0.7.34-lp150.2.3.1.i586.rpm
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
libMagick++-devel-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-devel-7.0.7.34-lp150.2.3.1.i586.rpm
libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickCore-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.i586.rpm
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickWand-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.i586.rpm
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
perl-PerlMagick-7.0.7.34-lp150.2.3.1.i586.rpm
perl-PerlMagick-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
openSUSE-2018-573
Security update for xdg-utils
important
openSUSE Leap 15.0 Update
This update for xdg-utils fixes this security issues:
- CVE-2017-18266: The open_envvar function in xdg-open did not validate strings
launching the program specified by the BROWSER environment variable, which
might allowed remote attackers to conduct argument-injection attacks via a
crafted URL (bsc#1093086).
xdg-utils-20170508-lp150.3.3.2.noarch.rpm
xdg-utils-20170508-lp150.3.3.2.src.rpm
openSUSE-2018-576
Recommended update for tar
moderate
openSUSE Leap 15.0 Update
This update for tar to version 1.30 fixes the following issues:
- Report erroneous use of position-sensitive options.
- --numeric-owner now affects private headers too.
- Fixed the --delay-directory-restore option
- The --warnings=none option now suppresses all warnings
- Fixed reporting of hardlink mismatches during compare
This update also replaces a previously patched security fix with the full upstream version:
- Member names containing '..' components are now skipped when extracting
tar-1.30-lp150.2.3.2.src.rpm
tar-1.30-lp150.2.3.2.x86_64.rpm
tar-backup-scripts-1.30-lp150.2.3.2.noarch.rpm
tar-debuginfo-1.30-lp150.2.3.2.x86_64.rpm
tar-debugsource-1.30-lp150.2.3.2.x86_64.rpm
tar-doc-1.30-lp150.2.3.2.noarch.rpm
tar-lang-1.30-lp150.2.3.2.noarch.rpm
tar-rmt-1.30-lp150.2.3.2.x86_64.rpm
tar-rmt-debuginfo-1.30-lp150.2.3.2.x86_64.rpm
tar-tests-1.30-lp150.2.3.2.x86_64.rpm
tar-tests-debuginfo-1.30-lp150.2.3.2.x86_64.rpm
tar-1.30-lp150.2.3.2.i586.rpm
tar-debuginfo-1.30-lp150.2.3.2.i586.rpm
tar-debugsource-1.30-lp150.2.3.2.i586.rpm
tar-rmt-1.30-lp150.2.3.2.i586.rpm
tar-rmt-debuginfo-1.30-lp150.2.3.2.i586.rpm
tar-tests-1.30-lp150.2.3.2.i586.rpm
tar-tests-debuginfo-1.30-lp150.2.3.2.i586.rpm
openSUSE-2018-600
Security update for glibc
moderate
openSUSE Leap 15.0 Update
This update for glibc fixes the following issues:
This security issue was fixed:
- Fixed an buffer overwrite issue in memcpy for Knights Landing CPUs
(boo#1092877, CVE-2018-11237)
glibc-2.26-lp150.11.3.2.src.rpm
glibc-2.26-lp150.11.3.2.x86_64.rpm
glibc-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-debugsource-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-static-2.26-lp150.11.3.2.x86_64.rpm
glibc-extra-2.26-lp150.11.3.2.x86_64.rpm
glibc-extra-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-html-2.26-lp150.11.3.2.noarch.rpm
glibc-i18ndata-2.26-lp150.11.3.2.noarch.rpm
glibc-info-2.26-lp150.11.3.2.noarch.rpm
glibc-locale-2.26-lp150.11.3.2.x86_64.rpm
glibc-locale-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-profile-2.26-lp150.11.3.2.x86_64.rpm
nscd-2.26-lp150.11.3.2.x86_64.rpm
nscd-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-testsuite-src-2.26-lp150.11.3.2.nosrc.rpm
glibc-utils-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-src-2.26-lp150.11.3.2.nosrc.rpm
glibc-utils-src-debugsource-2.26-lp150.11.3.2.x86_64.rpm
glibc-2.26-lp150.11.3.2.i586.rpm
glibc-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-debugsource-2.26-lp150.11.3.2.i586.rpm
glibc-devel-2.26-lp150.11.3.2.i586.rpm
glibc-devel-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-devel-static-2.26-lp150.11.3.2.i586.rpm
glibc-extra-2.26-lp150.11.3.2.i586.rpm
glibc-extra-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-locale-2.26-lp150.11.3.2.i586.rpm
glibc-locale-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-profile-2.26-lp150.11.3.2.i586.rpm
nscd-2.26-lp150.11.3.2.i586.rpm
nscd-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-2.26-lp150.11.3.2.i686.rpm
glibc-2.26-lp150.11.3.2.nosrc.rpm
glibc-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-debuginfo-2.26-lp150.11.3.2.i686.rpm
glibc-debugsource-2.26-lp150.11.3.2.i686.rpm
glibc-devel-2.26-lp150.11.3.2.i686.rpm
glibc-devel-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-debuginfo-2.26-lp150.11.3.2.i686.rpm
glibc-devel-static-2.26-lp150.11.3.2.i686.rpm
glibc-devel-static-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-locale-2.26-lp150.11.3.2.i686.rpm
glibc-locale-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-locale-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-locale-debuginfo-2.26-lp150.11.3.2.i686.rpm
glibc-profile-2.26-lp150.11.3.2.i686.rpm
glibc-profile-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-2.26-lp150.11.3.2.i586.rpm
glibc-utils-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-utils-src-debugsource-2.26-lp150.11.3.2.i586.rpm
openSUSE-2018-601
Security update for slf4j
important
openSUSE Leap 15.0 Update
This update for slf4j fixes the following security issue:
- CVE-2018-8088: Remote attackers could have bypassed intended access
restrictions via crafted data. Disallow EventData deserialization by default
from now on (bsc#1085970).
slf4j-1.7.12-lp150.4.3.1.noarch.rpm
slf4j-1.7.12-lp150.4.3.1.src.rpm
slf4j-javadoc-1.7.12-lp150.4.3.1.noarch.rpm
slf4j-manual-1.7.12-lp150.4.3.1.noarch.rpm
openSUSE-2018-602
Security update for libvirt
important
openSUSE Leap 15.0 Update
This update for libvirt fixes the following issues:
This update fixes the following security issue:
- Added support for 'ssbd' and 'virt-ssbd' CPUID feature bits (CVE-2018-3639, boo#1092885)
libvirt-4.0.0-lp150.7.3.1.src.rpm
libvirt-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-admin-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-admin-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-client-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-client-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-config-network-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-config-nwfilter-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-interface-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-interface-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-libxl-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-libxl-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-lxc-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-lxc-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-network-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-network-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-nodedev-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-nodedev-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-nwfilter-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-nwfilter-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-qemu-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-qemu-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-secret-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-secret-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-core-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-core-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-disk-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-disk-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-logical-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-logical-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-mpath-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-mpath-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-rbd-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-rbd-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-scsi-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-scsi-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-uml-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-uml-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-vbox-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-vbox-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-hooks-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-lxc-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-qemu-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-uml-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-vbox-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-xen-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-debugsource-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-devel-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-doc-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-libs-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-libs-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-lock-sanlock-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-lock-sanlock-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-nss-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-nss-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
wireshark-plugin-libvirt-4.0.0-lp150.7.3.1.x86_64.rpm
wireshark-plugin-libvirt-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-4.0.0-lp150.7.3.1.i586.rpm
libvirt-admin-4.0.0-lp150.7.3.1.i586.rpm
libvirt-admin-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-client-32bit-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-client-4.0.0-lp150.7.3.1.i586.rpm
libvirt-client-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-config-network-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-config-nwfilter-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-interface-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-interface-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-lxc-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-lxc-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-network-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-network-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-nodedev-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-nodedev-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-nwfilter-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-nwfilter-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-qemu-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-qemu-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-secret-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-secret-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-core-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-core-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-disk-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-disk-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-iscsi-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-iscsi-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-logical-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-logical-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-mpath-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-mpath-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-scsi-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-scsi-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-uml-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-uml-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-vbox-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-vbox-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-hooks-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-lxc-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-qemu-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-uml-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-vbox-4.0.0-lp150.7.3.1.i586.rpm
libvirt-debugsource-4.0.0-lp150.7.3.1.i586.rpm
libvirt-devel-32bit-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-devel-4.0.0-lp150.7.3.1.i586.rpm
libvirt-doc-4.0.0-lp150.7.3.1.i586.rpm
libvirt-libs-4.0.0-lp150.7.3.1.i586.rpm
libvirt-libs-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-lock-sanlock-4.0.0-lp150.7.3.1.i586.rpm
libvirt-lock-sanlock-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-nss-4.0.0-lp150.7.3.1.i586.rpm
libvirt-nss-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
wireshark-plugin-libvirt-4.0.0-lp150.7.3.1.i586.rpm
wireshark-plugin-libvirt-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
openSUSE-2018-568
Recommended update for patch
low
openSUSE Leap 15.0 Update
This update for patch fixes the following issue:
- Fixed a temporary file leak when applying ed-style patches (boo#1092500).
patch-2.7.6-lp150.3.3.1.src.rpm
patch-2.7.6-lp150.3.3.1.x86_64.rpm
patch-debuginfo-2.7.6-lp150.3.3.1.x86_64.rpm
patch-debugsource-2.7.6-lp150.3.3.1.x86_64.rpm
patch-2.7.6-lp150.3.3.1.i586.rpm
patch-debuginfo-2.7.6-lp150.3.3.1.i586.rpm
patch-debugsource-2.7.6-lp150.3.3.1.i586.rpm
openSUSE-2018-603
Security update for qemu
important
openSUSE Leap 15.0 Update
This update for qemu fixes the following issues:
This security issue was fixed:
- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).
Systems with microprocessors utilizing speculative execution and speculative
execution of memory reads before the addresses of all prior memory writes are
known may allow unauthorized disclosure of information to an attacker with
local user access via a side-channel analysis.
This patch permits the new x86 cpu feature flag named "ssbd" to be
presented to the guest, given that the host has this feature, and
KVM exposes it to the guest as well.
For this feature to be enabled please use the qemu commandline
-cpu $MODEL,+spec-ctrl,+ssbd
so the guest OS can take advantage of the feature.
spec-ctrl and ssbd support is also required in the host.
This non-security issue was fixed:
- Fix qemu-guest-agent uninstall (boo#1093169)
qemu-linux-user-2.11.1-lp150.7.3.1.src.rpm
qemu-linux-user-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-linux-user-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-linux-user-debugsource-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-testsuite-2.11.1-lp150.7.3.1.src.rpm
qemu-testsuite-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-2.11.1-lp150.7.3.1.src.rpm
qemu-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-arm-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-arm-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-curl-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-curl-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-dmg-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-dmg-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-gluster-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-gluster-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-iscsi-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-iscsi-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-rbd-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-rbd-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-ssh-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-ssh-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-debugsource-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-extra-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-extra-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-guest-agent-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-guest-agent-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-ipxe-1.0.0-lp150.7.3.1.noarch.rpm
qemu-ksm-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-kvm-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-lang-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-ppc-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-ppc-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-s390-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-s390-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-seabios-1.11.0-lp150.7.3.1.noarch.rpm
qemu-sgabios-8-lp150.7.3.1.noarch.rpm
qemu-tools-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-tools-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-vgabios-1.11.0-lp150.7.3.1.noarch.rpm
qemu-x86-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-x86-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
openSUSE-2018-572
Security update for mariadb
moderate
openSUSE Leap 15.0 Update
This update for mariadb to version 10.2.15 fixes the following issues:
These security issues were fixed:
- CVE-2018-2767: Enforse use of SSL/TLS in embedded server library (Return of
BACKRONYM) (bsc#1088681).
- CVE-2018-2786: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server as well as unauthorized update, insert or delete access to
some of MySQL Server accessible data (bsc#1089987).
- CVE-2018-2759: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987).
- CVE-2018-2777: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987).
- CVE-2018-2810: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987).
- CVE-2018-2782: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed low privileged
attacker with network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized ability to
cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
(bsc#1089987, bsc#1090518).
- CVE-2018-2784: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed low privileged
attacker with network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized ability to
cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
(bsc#1089987, bsc#1090518).
- CVE-2018-2787: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server as well as unauthorized update, insert or delete access to
some of MySQL Server accessible data (bsc#1089987, bsc#1090518).
- CVE-2018-2766: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2755: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Replication). Difficult to exploit vulnerability allowed
unauthenticated attacker with logon to the infrastructure where MySQL Server
executes to compromise MySQL Server. Successful attacks require human
interaction from a person other than the attacker and while the vulnerability
is in MySQL Server, attacks may significantly impact additional products.
Successful attacks of this vulnerability can result in takeover of MySQL Server
(bsc#1089987, bsc#1090518).
- CVE-2018-2819: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed low privileged
attacker with network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized ability to
cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
(bsc#1089987, bsc#1090518).
- CVE-2018-2817: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: DDL). Easily exploitable vulnerability allowed low
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2761: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Client programs). Difficult to exploit vulnerability allowed
unauthenticated attacker with network access via multiple protocols to
compromise MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2781: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Optimizer). Easily exploitable vulnerability allowed
high privileged attacker with network access via multiple protocols to
compromise MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2771: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Locking). Difficult to exploit vulnerability allowed
high privileged attacker with network access via multiple protocols to
compromise MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2813: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: DDL). Easily exploitable vulnerability allowed low
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized read access to a subset of MySQL Server accessible data
(bsc#1089987, bsc#1090518).
These non-security issues were fixed:
- PCRE updated to 8.42
- Incomplete validation of missing tablespace during recovery
- ib_buffer_pool unnecessarily includes the temporary tablespace
- InnoDB may write uninitialized garbage to redo log
- Virtual Columns: Assertion failed in dict_table_get_col_name
- slow innodb startup/shutdown can exceed systemd timeout
- Assertion failed in dict_check_sys_tables on upgrade from 5.5
- Change buffer crash during TRUNCATE or DROP TABLE
- temporary table ROLLBACK fixes
For additional details please see
- https://mariadb.com/kb/en/library/mariadb-10215-release-notes
- https://mariadb.com/kb/en/library/mariadb-10215-changelog
libmysqld-devel-10.2.15-lp150.2.3.2.x86_64.rpm
libmysqld19-10.2.15-lp150.2.3.2.x86_64.rpm
libmysqld19-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-10.2.15-lp150.2.3.2.src.rpm
mariadb-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-bench-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-bench-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-client-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-client-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-debugsource-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-errormessages-10.2.15-lp150.2.3.2.noarch.rpm
mariadb-galera-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-test-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-test-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-tools-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-tools-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
libmysqld-devel-10.2.15-lp150.2.3.2.i586.rpm
libmysqld19-10.2.15-lp150.2.3.2.i586.rpm
libmysqld19-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-10.2.15-lp150.2.3.2.i586.rpm
mariadb-bench-10.2.15-lp150.2.3.2.i586.rpm
mariadb-bench-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-client-10.2.15-lp150.2.3.2.i586.rpm
mariadb-client-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-debugsource-10.2.15-lp150.2.3.2.i586.rpm
mariadb-galera-10.2.15-lp150.2.3.2.i586.rpm
mariadb-test-10.2.15-lp150.2.3.2.i586.rpm
mariadb-test-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-tools-10.2.15-lp150.2.3.2.i586.rpm
mariadb-tools-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
openSUSE-2018-577
Recommended update for yast2-storage-ng
low
openSUSE Leap 15.0 Update
This update for yast2-storage-ng fixes the following issues:
- Partitioner: Fixed an error when creating new BTRFS subvolumes in
an installed system (boo#1067510)
- Partitioner: Handle limitations for volume labels (boo#1084867)
- Partitioner: Allow to move partitions (part of fate#318196)
yast2-storage-ng-4.0.186-lp150.2.6.1.src.rpm
yast2-storage-ng-4.0.186-lp150.2.6.1.x86_64.rpm
yast2-storage-ng-4.0.186-lp150.2.6.1.i586.rpm
openSUSE-2018-592
Security update for mupdf
moderate
openSUSE Leap 15.0 Update
This update for mupdf fixes the following security issue:
- CVE-2018-1000051: Prevent use after free in fz_keep_key_storable that can
result in DOS / possible code execution. This attack appear to be exploitable
via Victim opens a specially crafted PDF (bsc#1080531).
mupdf-1.12.0-lp150.3.3.1.src.rpm
mupdf-1.12.0-lp150.3.3.1.x86_64.rpm
mupdf-debuginfo-1.12.0-lp150.3.3.1.x86_64.rpm
mupdf-debugsource-1.12.0-lp150.3.3.1.x86_64.rpm
mupdf-devel-static-1.12.0-lp150.3.3.1.x86_64.rpm
mupdf-1.12.0-lp150.3.3.1.i586.rpm
mupdf-debuginfo-1.12.0-lp150.3.3.1.i586.rpm
mupdf-debugsource-1.12.0-lp150.3.3.1.i586.rpm
mupdf-devel-static-1.12.0-lp150.3.3.1.i586.rpm
openSUSE-2018-578
Recommended update for autoyast2
low
openSUSE Leap 15.0 Update
This update for autoyast2 fixes the following issues:
- Partition configuration: Do not ask for saving values if they have
not been changed at all. (boo#1082556)
- Using new libstorage-ng in order to handle "label" tag in URL.
E.G.: autoyast=label://my_home//autoinst.xml (boo#1094533)
autoyast2-4.0.55-lp150.2.3.1.noarch.rpm
autoyast2-4.0.55-lp150.2.3.1.src.rpm
autoyast2-installation-4.0.55-lp150.2.3.1.noarch.rpm
openSUSE-2018-604
Recommended update for guix
moderate
openSUSE Leap 15.0 Update
This update for guix fixes the following issues:
- Bugfix: package fetching via https was not possible (boo#1095970)
guix-0.14.0-lp150.2.3.1.src.rpm
guix-0.14.0-lp150.2.3.1.x86_64.rpm
guix-debuginfo-0.14.0-lp150.2.3.1.x86_64.rpm
guix-debugsource-0.14.0-lp150.2.3.1.x86_64.rpm
openSUSE-2018-627
Security update for taglib
low
openSUSE Leap 15.0 Update
This update for taglib fixes this security issues:
- CVE-2018-11439: The TagLib::Ogg::FLAC::File::scan function allowed remote
attackers to cause information disclosure (heap-based buffer over-read) via a
crafted audio file (bsc#1096180).
libtag-devel-1.11.1-lp150.3.3.1.x86_64.rpm
libtag1-1.11.1-lp150.3.3.1.x86_64.rpm
libtag1-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
libtag_c0-1.11.1-lp150.3.3.1.x86_64.rpm
libtag_c0-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
taglib-1.11.1-lp150.3.3.1.src.rpm
taglib-1.11.1-lp150.3.3.1.x86_64.rpm
taglib-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
taglib-debugsource-1.11.1-lp150.3.3.1.x86_64.rpm
libtag-devel-1.11.1-lp150.3.3.1.i586.rpm
libtag1-1.11.1-lp150.3.3.1.i586.rpm
libtag1-32bit-1.11.1-lp150.3.3.1.x86_64.rpm
libtag1-32bit-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
libtag1-debuginfo-1.11.1-lp150.3.3.1.i586.rpm
libtag_c0-1.11.1-lp150.3.3.1.i586.rpm
libtag_c0-32bit-1.11.1-lp150.3.3.1.x86_64.rpm
libtag_c0-32bit-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
libtag_c0-debuginfo-1.11.1-lp150.3.3.1.i586.rpm
taglib-1.11.1-lp150.3.3.1.i586.rpm
taglib-debuginfo-1.11.1-lp150.3.3.1.i586.rpm
taglib-debugsource-1.11.1-lp150.3.3.1.i586.rpm
openSUSE-2018-579
Optional update to add pam_ldap
moderate
openSUSE Leap 15.0 Update
This optional update adds pam_ldap to the distribution.
The pam_ldap is required for LDAP configuration in YaST2. (boo#1096173)
pam_ldap-186-lp150.2.1.src.rpm
pam_ldap-186-lp150.2.1.x86_64.rpm
pam_ldap-debuginfo-186-lp150.2.1.x86_64.rpm
pam_ldap-debugsource-186-lp150.2.1.x86_64.rpm
openSUSE-2018-581
Recommended update for yast2
moderate
openSUSE Leap 15.0 Update
This update for yast2 fixes the following issues:
- Display proper release notes for product (bsc#1096138)
- Rename SLES_HPC to SLE_HPC (bsc#1095053)
- Calling YAST module: Do not create a post Snapper image if the pre Snapper image has
already been failed (bsc#1093374)
yast2-4.0.77-lp150.2.3.1.src.rpm
yast2-4.0.77-lp150.2.3.1.x86_64.rpm
yast2-4.0.77-lp150.2.3.1.i586.rpm
openSUSE-2018-589
Security update for curl
moderate
openSUSE Leap 15.0 Update
This update for curl to version 7.60.0 fixes the following issues:
These security issues were fixed:
- CVE-2018-1000300: Prevent heap-based buffer overflow when closing down an FTP
connection with very long server command replies (bsc#1092094).
- CVE-2018-1000301: Prevent buffer over-read that could have cause reading data
beyond the end of a heap based buffer used to store downloaded RTSP content
(bsc#1092098).
These non-security issues were fixed:
- Add CURLOPT_HAPROXYPROTOCOL, support for the HAProxy PROXY protocol
- Add --haproxy-protocol for the command line tool
- Add CURLOPT_DNS_SHUFFLE_ADDRESSES, shuffle returned IP addresses
- FTP: fix typo in recursive callback detection for seeking
- test1208: marked flaky
- HTTP: make header-less responses still count correct body size
- user-agent.d:: mention --proxy-header as well
- http2: fixes typo
- cleanup: misc typos in strings and comments
- rate-limit: use three second window to better handle high speeds
- examples/hiperfifo.c: improved
- pause: when changing pause state, update socket state
- curl_version_info.3: fix ssl_version description
- add_handle/easy_perform: clear errorbuffer on start if set
- cmake: add support for brotli
- parsedate: support UT timezone
- vauth/ntlm.h: fix the #ifdef header guard
- lib/curl_path.h: added #ifdef header guard
- vauth/cleartext: fix integer overflow check
- CURLINFO_COOKIELIST.3: made the example not leak memory
- cookie.d: mention that "-" as filename means stdin
- CURLINFO_SSL_VERIFYRESULT.3: fixed the example
- http2: read pending frames (including GOAWAY) in connection-check
- timeval: remove compilation warning by casting
- cmake: avoid warn-as-error during config checks
- travis-ci: enable -Werror for CMake builds
- openldap: fix for NULL return from ldap_get_attribute_ber()
- threaded resolver: track resolver time and set suitable timeout values
- cmake: Add advapi32 as explicit link library for win32
- docs: fix CURLINFO_*_T examples use of CURL_FORMAT_CURL_OFF_T
- test1148: set a fixed locale for the test
- cookies: when reading from a file, only remove_expired once
- cookie: store cookies per top-level-domain-specific hash table
- openssl: RESTORED verify locations when verifypeer==0
- file: restore old behavior for file:////foo/bar URLs
- FTP: allow PASV on IPv6 connections when a proxy is being used
- build-openssl.bat: allow custom paths for VS and perl
- winbuild: make the clean target work without build-type
- build-openssl.bat: Refer to VS2017 as VC14.1 instead of VC15
- curl: retry on FTP 4xx, ignore other protocols
- configure: detect (and use) sa_family_t
- examples/sftpuploadresume: Fix Windows large file seek
- build: cleanup to fix clang warnings/errors
- winbuild: updated the documentation
- lib: silence null-dereference warnings
- travis: bump to clang 6 and gcc 7
- travis: build libpsl and make builds use it
- proxy: show getenv proxy use in verbose output
- duphandle: make sure CURLOPT_RESOLVE is duplicated
- all: Refactor malloc+memset to use calloc
- checksrc: Fix typo
- system.h: Add sparcv8plus to oracle/sunpro 32-bit detection
- vauth: Fix typo
- ssh: show libSSH2 error code when closing fails
- test1148: tolerate progress updates better
- urldata: make service names unconditional
- configure: keep LD_LIBRARY_PATH changes local
- ntlm_sspi: fix authentication using Credential Manager
- schannel: add client certificate authentication
- winbuild: Support custom devel paths for each dependency
- schannel: add support for CURLOPT_CAINFO
- http2: handle on_begin_headers() called more than once
- openssl: support OpenSSL 1.1.1 verbose-mode trace messages
- openssl: fix subjectAltName check on non-ASCII platforms
- http2: avoid strstr() on data not zero terminated
- http2: clear the "drain counter" when a stream is closed
- http2: handle GOAWAY properly
- tool_help: clarify --max-time unit of time is seconds
- curl.1: clarify that options and URLs can be mixed
- http2: convert an assert to run-time check
- curl_global_sslset: always provide available backends
- ftplistparser: keep state between invokes
- Curl_memchr: zero length input can't match
- examples/sftpuploadresume: typecast fseek argument to long
- examples/http2-upload: expand buffer to avoid silly warning
- ctype: restore character classification for non-ASCII platforms
- mime: avoid NULL pointer dereference risk
- cookies: ensure that we have cookies before writing jar
- os400.c: fix checksrc warnings
- configure: provide --with-wolfssl as an alias for --with-cyassl
- cyassl: adapt to libraries without TLS 1.0 support built-in
- http2: get rid of another strstr
- checksrc: force indentation of lines after an else
- cookies: remove unused macro
- CURLINFO_PROTOCOL.3: mention the existing defined names
- tests: provide 'manual' as a feature to optionally require
- travis: enable libssh2 on both macos and Linux
- CURLOPT_URL.3: added ENCODING section
- wolfssl: Fix non-blocking connect
- vtls: don't define MD5_DIGEST_LENGTH for wolfssl
- docs: remove extraneous commas in man pages
- URL: fix ASCII dependency in strcpy_url and strlen_url
- ssh-libssh.c: fix left shift compiler warning
- configure: only check for CA bundle for file-using SSL backends
- travis: add an mbedtls build
- http: don't set the "rewind" flag when not uploading anything
- configure: put CURLDEBUG and DEBUGBUILD in lib/curl_config.h
- transfer: don't unset writesockfd on setup of multiplexed conns
- vtls: use unified "supports" bitfield member in backends
- URLs: fix one more http url
- travis: add a build using WolfSSL
- openssl: change FILE ops to BIO ops
- travis: add build using NSS
- smb: reject negative file sizes
- cookies: accept parameter names as cookie name
- http2: getsock fix for uploads
- all over: fixed format specifiers
- http2: use the correct function pointer typedef
curl-mini-7.60.0-lp150.2.3.1.src.rpm
curl-mini-7.60.0-lp150.2.3.1.x86_64.rpm
curl-mini-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
curl-mini-debugsource-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl-mini-devel-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-mini-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-mini-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
curl-7.60.0-lp150.2.3.1.src.rpm
curl-7.60.0-lp150.2.3.1.x86_64.rpm
curl-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
curl-debugsource-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl-devel-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
curl-mini-7.60.0-lp150.2.3.1.i586.rpm
curl-mini-debuginfo-7.60.0-lp150.2.3.1.i586.rpm
curl-mini-debugsource-7.60.0-lp150.2.3.1.i586.rpm
libcurl-mini-devel-7.60.0-lp150.2.3.1.i586.rpm
libcurl4-mini-7.60.0-lp150.2.3.1.i586.rpm
libcurl4-mini-debuginfo-7.60.0-lp150.2.3.1.i586.rpm
curl-7.60.0-lp150.2.3.1.i586.rpm
curl-debuginfo-7.60.0-lp150.2.3.1.i586.rpm
curl-debugsource-7.60.0-lp150.2.3.1.i586.rpm
libcurl-devel-32bit-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl-devel-7.60.0-lp150.2.3.1.i586.rpm
libcurl4-32bit-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-32bit-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-7.60.0-lp150.2.3.1.i586.rpm
libcurl4-debuginfo-7.60.0-lp150.2.3.1.i586.rpm
openSUSE-2018-629
Security update for opencv
moderate
openSUSE Leap 15.0 Update
This update for opencv fixes this security issue:
- CVE-2017-18009: Prevent heap-based buffer over-read in the function
cv::HdrDecoder::checkSignature (bsc#1074312).
libopencv3_3-3.3.1-lp150.4.3.1.x86_64.rpm
libopencv3_3-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-3.3.1-lp150.4.3.1.src.rpm
opencv-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-debugsource-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-devel-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-doc-3.3.1-lp150.4.3.1.x86_64.rpm
python2-opencv-3.3.1-lp150.4.3.1.x86_64.rpm
python2-opencv-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm
python3-opencv-3.3.1-lp150.4.3.1.x86_64.rpm
python3-opencv-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm
openSUSE-2018-585
Recommended update for biosdevname
moderate
openSUSE Leap 15.0 Update
This update for biosdevname fixes the following issues:
- biosdevname could crash due to an infinite recursion (boo#1093625)
biosdevname-0.7.3-lp150.3.3.1.src.rpm
biosdevname-0.7.3-lp150.3.3.1.x86_64.rpm
biosdevname-debuginfo-0.7.3-lp150.3.3.1.x86_64.rpm
biosdevname-debugsource-0.7.3-lp150.3.3.1.x86_64.rpm
biosdevname-0.7.3-lp150.3.3.1.i586.rpm
biosdevname-debuginfo-0.7.3-lp150.3.3.1.i586.rpm
biosdevname-debugsource-0.7.3-lp150.3.3.1.i586.rpm
openSUSE-2018-583
Recommended update for cloud-init
moderate
openSUSE Leap 15.0 Update
This update for cloud-init fixes the following issues:
- cloud-init may have reported "no datasource found (boo#1089824, boo#1093501)
This bugfix is an improvement on a previous change.
cloud-init-18.2-lp150.2.6.1.src.rpm
cloud-init-18.2-lp150.2.6.1.x86_64.rpm
cloud-init-config-suse-18.2-lp150.2.6.1.x86_64.rpm
cloud-init-doc-18.2-lp150.2.6.1.x86_64.rpm
openSUSE-2018-587
Recommended update for crmsh
moderate
openSUSE Leap 15.0 Update
This update for crmsh fixes the following issues:
- bash_completion: non-interactive mode completer did not work (boo#1090304)
- terminal could have lost cursor after typing ctrl+c (boo#1090626)
- Wrong prompt string after poped help messages when input at a new line (boo#1090140)
- Documentation formatting issue (boo#1075764)
crmsh-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.noarch.rpm
crmsh-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.src.rpm
crmsh-scripts-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.noarch.rpm
crmsh-test-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.noarch.rpm
openSUSE-2018-588
Recommended update for filesystem
moderate
openSUSE Leap 15.0 Update
This update for filesystem fixes the following issues:
- possible shutdown issues after upgrading from an older release (boo#1084119)
filesystem-15.0-lp150.8.3.1.src.rpm
filesystem-15.0-lp150.8.3.1.x86_64.rpm
filesystem-15.0-lp150.8.3.1.i586.rpm
openSUSE-2018-584
Recommended update for google-compute-engine
important
openSUSE Leap 15.0 Update
This update for google-compute-engine fixes the following issues:
- Instance initialization failed due to an incompatibility with Python 3 (boo#1094074)
google-compute-engine-20180510-lp150.2.6.1.src.rpm
google-compute-engine-init-20180510-lp150.2.6.1.noarch.rpm
google-compute-engine-oslogin-20180510-lp150.2.6.1.x86_64.rpm
google-compute-engine-oslogin-debuginfo-20180510-lp150.2.6.1.x86_64.rpm
google-compute-engine-oslogin-20180510-lp150.2.6.1.i586.rpm
google-compute-engine-oslogin-32bit-20180510-lp150.2.6.1.x86_64.rpm
google-compute-engine-oslogin-32bit-debuginfo-20180510-lp150.2.6.1.x86_64.rpm
google-compute-engine-oslogin-debuginfo-20180510-lp150.2.6.1.i586.rpm
openSUSE-2018-575
Security update for MozillaFirefox, mozilla-nss
important
openSUSE Leap 15.0 Update
This update for MozillaFirefox, mozilla-nss fixes the following issues:
Security issue fixed in Mozilla Firefox 60.0.2 ESR:
- CVE-2018-6126: Heap buffer overflow rasterizing paths in SVG with Skia (MFSA 2018-14, boo#1096449)
The following bugs were fixed:
- In KDE Open with option in download dialog has no effect with kmozillahelper (boo#1094747)
- Startup crashes on aarch64 (boo#1093059)
Mozilla Firefox now requires NSS 3.36.4 (boo#1096515). The following changes are included in NSS:
- Fix issues connecting to servers recently upgraded to TLS 1.3 (SSL_RX_MALFORMED_SERVER_HELLO error)
- Fix a rare bug with PKCS#12 files
- Apply additional harding (relro linker option)
MozillaFirefox-60.0.2-lp150.3.6.1.src.rpm
MozillaFirefox-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-branding-upstream-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-buildsymbols-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-debuginfo-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-debugsource-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-devel-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-translations-common-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-translations-other-60.0.2-lp150.3.6.1.x86_64.rpm
libfreebl3-3.36.4-lp150.2.3.1.x86_64.rpm
libfreebl3-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
libsoftokn3-3.36.4-lp150.2.3.1.x86_64.rpm
libsoftokn3-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-3.36.4-lp150.2.3.1.src.rpm
mozilla-nss-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-debugsource-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-devel-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-sysinit-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-sysinit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-tools-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-tools-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
libfreebl3-3.36.4-lp150.2.3.1.i586.rpm
libfreebl3-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
libfreebl3-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
libfreebl3-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
libsoftokn3-3.36.4-lp150.2.3.1.i586.rpm
libsoftokn3-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
libsoftokn3-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
libsoftokn3-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-certs-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-debugsource-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-devel-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-sysinit-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-sysinit-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-sysinit-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-sysinit-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-tools-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-tools-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
openSUSE-2018-593
Recommended update for yast2-proxy
moderate
openSUSE Leap 15.0 Update
This update for yast2-proxy fixes the following issues:
- Clean up of 'No Proxy Domains' field when whitespaces are detected (bsc#1089796)
yast2-proxy-4.0.1-lp150.2.3.1.noarch.rpm
yast2-proxy-4.0.1-lp150.2.3.1.src.rpm
openSUSE-2018-594
Recommended update for yast2-printer
moderate
openSUSE Leap 15.0 Update
This update for yast2-printer fixes the following issues:
- Fixed alignment of input fields in "Connection Wizard". (bsc#1091290)
yast2-printer-4.0.2-lp150.2.3.1.src.rpm
yast2-printer-4.0.2-lp150.2.3.1.x86_64.rpm
yast2-printer-debuginfo-4.0.2-lp150.2.3.1.x86_64.rpm
yast2-printer-debugsource-4.0.2-lp150.2.3.1.x86_64.rpm
yast2-printer-4.0.2-lp150.2.3.1.i586.rpm
yast2-printer-debuginfo-4.0.2-lp150.2.3.1.i586.rpm
yast2-printer-debugsource-4.0.2-lp150.2.3.1.i586.rpm
openSUSE-2018-608
Recommended update for libstorage-ng
important
openSUSE Leap 15.0 Update
This update for libstorage-ng fixes the following issues:
- multiple translation updates
- YaST error caused when auto-mounting ext4 partition on Xen PV device after FS resize (boo#1073633)
- error creating partitions on GPT not using complete disk (boo#1092193)
- A message "Probing partitions failed" while Installation could be shown on Power (boo#1095168)
- Avoid functional conflicts with libdmraid during upgrade (boo#1088570)
- issues probing storage of certain nvme systems (boo#1093684)
libstorage-ng-3.3.300-lp150.2.3.2.src.rpm
libstorage-ng-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-debugsource-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-devel-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-integration-tests-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-lang-3.3.300-lp150.2.3.2.noarch.rpm
libstorage-ng-python3-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-python3-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-ruby-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-ruby-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-utils-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-utils-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng1-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng1-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-debugsource-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-devel-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-integration-tests-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-python3-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-python3-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-ruby-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-ruby-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-utils-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-utils-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng1-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng1-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
openSUSE-2018-595
Recommended update for yast2-pkg-bindings-devel-doc
moderate
openSUSE Leap 15.0 Update
This update for yast2-pkg-bindings-devel-doc fixes the following issues:
- Bugfix: Do not reset the source manager if also the options are the same as the ones
used previously (bsc#1095702)
yast2-pkg-bindings-devel-doc-4.0.11-lp150.2.6.1.noarch.rpm
yast2-pkg-bindings-devel-doc-4.0.11-lp150.2.6.1.src.rpm
yast2-pkg-bindings-4.0.11-lp150.2.6.1.src.rpm
yast2-pkg-bindings-4.0.11-lp150.2.6.1.x86_64.rpm
yast2-pkg-bindings-debuginfo-4.0.11-lp150.2.6.1.x86_64.rpm
yast2-pkg-bindings-debugsource-4.0.11-lp150.2.6.1.x86_64.rpm
yast2-pkg-bindings-4.0.11-lp150.2.6.1.i586.rpm
yast2-pkg-bindings-debuginfo-4.0.11-lp150.2.6.1.i586.rpm
yast2-pkg-bindings-debugsource-4.0.11-lp150.2.6.1.i586.rpm
openSUSE-2018-606
Recommended update for ibmtss
moderate
openSUSE Leap 15.0 Update
This update for ibmtss fixes the following issues:
- the ibmtss utility was missing the libtss.so.0 library (boo#1093612)
ibmtss-1045-lp150.3.3.1.src.rpm
ibmtss-1045-lp150.3.3.1.x86_64.rpm
ibmtss-base-1045-lp150.3.3.1.noarch.rpm
ibmtss-debuginfo-1045-lp150.3.3.1.x86_64.rpm
ibmtss-debugsource-1045-lp150.3.3.1.x86_64.rpm
ibmtss-devel-1045-lp150.3.3.1.x86_64.rpm
libtss0-1045-lp150.3.3.1.x86_64.rpm
libtss0-debuginfo-1045-lp150.3.3.1.x86_64.rpm
openSUSE-2018-605
Recommended update for cargo
low
openSUSE Leap 15.0 Update
This update for cargo contains the following change:
- cargo 0.26.0 is provided as imported from the SLE 15 codebase (boo#1096770)
- No longer removes rust or rs prefixs/suffixs.
- Now defaults to creating a binary crate, instead of a library crate
cargo-0.26.0-lp150.2.3.4.src.rpm
cargo-0.26.0-lp150.2.3.4.x86_64.rpm
cargo-debuginfo-0.26.0-lp150.2.3.4.x86_64.rpm
cargo-0.26.0-lp150.2.3.4.i686.rpm
cargo-debuginfo-0.26.0-lp150.2.3.4.i686.rpm
openSUSE-2018-611
Recommended update for hyper-v
moderate
openSUSE Leap 15.0 Update
This update for hyper-v fixes the following issues:
- Running lsvmbus may have failed due to an incorrect interpreter string (boo#1093910)
hyper-v-7-lp150.4.3.2.src.rpm
hyper-v-7-lp150.4.3.2.x86_64.rpm
hyper-v-debuginfo-7-lp150.4.3.2.x86_64.rpm
hyper-v-debugsource-7-lp150.4.3.2.x86_64.rpm
hyper-v-7-lp150.4.3.2.i586.rpm
hyper-v-debuginfo-7-lp150.4.3.2.i586.rpm
hyper-v-debugsource-7-lp150.4.3.2.i586.rpm
openSUSE-2018-607
Recommended update for issue-generator
moderate
openSUSE Leap 15.0 Update
This update for issue-generator fixes the following issues:
- Permission issue on /run/issue which was root readable only (boo#1095697)
issue-generator-1.6-lp150.3.6.2.noarch.rpm
issue-generator-1.6-lp150.3.6.2.src.rpm
openSUSE-2018-609
Recommended update for sysconfig
moderate
openSUSE Leap 15.0 Update
This update for sysconfig fixes the following issues:
- When using NetworkManager but some interfaces are not managed my NetworkManager,
such as when using a VPN client directly, the DNS entries were not set correctly (boo#1079793)
sysconfig-0.84.3-lp150.3.3.2.src.rpm
sysconfig-0.84.3-lp150.3.3.2.x86_64.rpm
sysconfig-debuginfo-0.84.3-lp150.3.3.2.x86_64.rpm
sysconfig-debugsource-0.84.3-lp150.3.3.2.x86_64.rpm
sysconfig-netconfig-0.84.3-lp150.3.3.2.x86_64.rpm
sysconfig-0.84.3-lp150.3.3.2.i586.rpm
sysconfig-debuginfo-0.84.3-lp150.3.3.2.i586.rpm
sysconfig-debugsource-0.84.3-lp150.3.3.2.i586.rpm
sysconfig-netconfig-0.84.3-lp150.3.3.2.i586.rpm
openSUSE-2018-610
Recommended update for libgphoto2
moderate
openSUSE Leap 15.0 Update
This update for libgphoto2 fixes the following issues:
- Import of Photos from Canon EOS did not work correctly (boo#1091309)
libgphoto2-2.5.18-lp150.2.3.1.src.rpm
libgphoto2-6-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-debuginfo-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-lang-2.5.18-lp150.2.3.1.noarch.rpm
libgphoto2-debugsource-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-devel-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-devel-doc-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-doc-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-6-32bit-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-32bit-debuginfo-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-debuginfo-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-debugsource-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-devel-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-devel-32bit-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-devel-doc-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-doc-2.5.18-lp150.2.3.1.i586.rpm
openSUSE-2018-612
Recommended update for hawk2
important
openSUSE Leap 15.0 Update
This update for hawk2 fixes the following issues:
- UI may have reported a lowlevel error on certain errror conditions (boo#1090562)
- Editing a resource with a name that contains a dot resulted in a redirection to 404 page (boo#1092108)
- Help links seeded adjustment (boo#1089709)
- Issues loading history explorer views (boo#1093420)
- Primitive resource creation sometimes failed in Hawk (boo#1092122)
hawk2-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.src.rpm
hawk2-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.x86_64.rpm
hawk2-debuginfo-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.x86_64.rpm
hawk2-debugsource-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.x86_64.rpm
openSUSE-2018-631
Recommended update for installation-images
moderate
openSUSE Leap 15.0 Update
This update for installation-images fixes the following issues:
- The installer dit not detext an existing ReiserFS system (fate#323394)
install-initrd-openSUSE-14.373-lp150.2.3.2.x86_64.rpm
installation-images-debuginfodeps-openSUSE-14.373-lp150.2.3.2.x86_64.rpm
skelcd-installer-net-openSUSE-14.373-lp150.2.3.2.x86_64.rpm
skelcd-installer-openSUSE-14.373-lp150.2.3.2.x86_64.rpm
tftpboot-installation-openSUSE-Leap-15.0-x86_64-14.373-lp150.2.3.2.noarch.rpm
openSUSE-2018-613
Recommended update for tmon
moderate
openSUSE Leap 15.0 Update
This update for tmon fixes the following issues:
- race condition related to "cur_thermal_record" caused segmentation faults (boo#1075156)
tmon-1.0-lp150.2.3.1.src.rpm
tmon-1.0-lp150.2.3.1.x86_64.rpm
tmon-debuginfo-1.0-lp150.2.3.1.x86_64.rpm
tmon-debugsource-1.0-lp150.2.3.1.x86_64.rpm
openSUSE-2018-615
Recommended update for rmt-server, yast2-rmt
moderate
openSUSE Leap 15.0 Update
This update contains the final releases for rmt-server and yast2-rmt (boo#1093879)
This updates contains various code and packaging fixes as released for SLE 15.
rmt-server is a Repository mirroring tool and registration proxy for SCC.
yast2-rmt is a YaST module for configuring it.
rmt-server-1.0.0-lp150.2.3.2.src.rpm
rmt-server-1.0.0-lp150.2.3.2.x86_64.rpm
rmt-server-debuginfo-1.0.0-lp150.2.3.2.x86_64.rpm
yast2-rmt-1.0.0-lp150.2.3.2.noarch.rpm
yast2-rmt-1.0.0-lp150.2.3.2.src.rpm
openSUSE-2018-652
Security update for aubio
low
openSUSE Leap 15.0 Update
This update for aubio fixes the following security issue:
- CVE-2017-17554: Prevent NULL pointer dereference in the function
aubio_source_avcodec_readframe which may have lead to DoS when playing a
crafted audio file (bsc#1072317).
aubio-0.4.6-lp150.3.3.1.src.rpm
aubio-debugsource-0.4.6-lp150.3.3.1.x86_64.rpm
aubio-tools-0.4.6-lp150.3.3.1.x86_64.rpm
aubio-tools-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm
libaubio-devel-0.4.6-lp150.3.3.1.x86_64.rpm
libaubio5-0.4.6-lp150.3.3.1.x86_64.rpm
libaubio5-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm
python-aubio-0.4.6-lp150.3.3.1.src.rpm
python-aubio-debugsource-0.4.6-lp150.3.3.1.x86_64.rpm
python2-aubio-0.4.6-lp150.3.3.1.x86_64.rpm
python2-aubio-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm
python3-aubio-0.4.6-lp150.3.3.1.x86_64.rpm
python3-aubio-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm
aubio-debugsource-0.4.6-lp150.3.3.1.i586.rpm
aubio-tools-0.4.6-lp150.3.3.1.i586.rpm
aubio-tools-debuginfo-0.4.6-lp150.3.3.1.i586.rpm
libaubio-devel-0.4.6-lp150.3.3.1.i586.rpm
libaubio5-0.4.6-lp150.3.3.1.i586.rpm
libaubio5-32bit-0.4.6-lp150.3.3.1.x86_64.rpm
libaubio5-32bit-debuginfo-0.4.6-lp150.3.3.1.x86_64.rpm
libaubio5-debuginfo-0.4.6-lp150.3.3.1.i586.rpm
openSUSE-2018-622
Recommended update for yast2-packager
moderate
openSUSE Leap 15.0 Update
This update for yast2-packager fixes the following issues:
- When running the installation in textmode, consider only the preselected language when
showing the license for extensions, modules or add-ons (boo#1094793).
- During an upgrade, skip the base produce license dialog when the
same license was already accepted (boo#1080450)
- Renaming of SLES_HPC to SLE_HPC (boo#1095053)
- Display an error popup when the FIPS compliant mode is active and the "fips" pattern is
not available (boo#1093060)
yast2-packager-4.0.67-lp150.2.6.2.src.rpm
yast2-packager-4.0.67-lp150.2.6.2.x86_64.rpm
yast2-packager-4.0.67-lp150.2.6.2.i586.rpm
openSUSE-2018-660
Recommended update for gnuhealth, tryton, trytond
moderate
openSUSE Leap 15.0 Update
This update for gnuhealth, tryton, trytond fixes the following issues:
- in GNU health, Caldav event did not update after changing the appointmen
- trytond: incorrect requirement on postgres96
gnuhealth-3.2.10-lp150.5.3.1.noarch.rpm
gnuhealth-3.2.10-lp150.5.3.1.src.rpm
tryton-4.2.14-lp150.2.3.1.noarch.rpm
tryton-4.2.14-lp150.2.3.1.src.rpm
trytond-4.2.12-lp150.2.5.1.noarch.rpm
trytond-4.2.12-lp150.2.5.1.src.rpm
openSUSE-2018-617
Recommended update for jeos-firstboot
moderate
openSUSE Leap 15.0 Update
This update for jeos-firstboot fixes the following issues:
- licenses in non-latin scripts were not displayed incorrectly (boo#1094346)
jeos-firstboot-0.0+git20180525.280836a-lp150.2.3.1.noarch.rpm
jeos-firstboot-0.0+git20180525.280836a-lp150.2.3.1.src.rpm
openSUSE-2018-618
Recommended update for mksusecd
moderate
openSUSE Leap 15.0 Update
This update for mksusecd fixes the following issues:
- joliet file names on generated media were too long (boo#1094687)
mksusecd-1.59-lp150.2.3.1.src.rpm
mksusecd-1.59-lp150.2.3.1.x86_64.rpm
mksusecd-debuginfo-1.59-lp150.2.3.1.x86_64.rpm
mksusecd-debugsource-1.59-lp150.2.3.1.x86_64.rpm
openSUSE-2018-619
Recommended update for patterns-base
moderate
openSUSE Leap 15.0 Update
This update for patterns-base fixes the following issues:
- /var/log/messages did not exist because rsyslog was not included in the base pattern (boo#1094841)
Rsyslog is now part of the base pattern for logging to go to /var/log/messages as documented.
patterns-base-20171206-lp150.15.6.1.src.rpm
patterns-base-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-apparmor-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-apparmor-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-apparmor_opt-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-base-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-base-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-basesystem-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-console-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-documentation-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-enhanced_base-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-enhanced_base-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-enhanced_base_opt-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-minimal_base-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-minimal_base-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-sw_management-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-sw_management-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-transactional_base-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-update_test-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11_enhanced-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11_enhanced-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11_opt-20171206-lp150.15.6.1.x86_64.rpm
openSUSE-2018-620
Recommended update for python-azure-agent
moderate
openSUSE Leap 15.0 Update
This update for python-azure-agent fixes the following issues:
- python-azure-agent uses obsolete nettools instead of ip tools (boo#1092831)
python-azure-agent-2.2.18-lp150.5.3.1.noarch.rpm
python-azure-agent-2.2.18-lp150.5.3.1.src.rpm
python-azure-agent-test-2.2.18-lp150.5.3.1.noarch.rpm
openSUSE-2018-632
Recommended update for spyder3
low
openSUSE Leap 15.0 Update
This update for spyder3 fixes the following issues:
- spyder3 did not declare the run-time dependency on python3-cloudpickle correctly (boo#1095587)
spyder3-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-3.2.8-lp150.2.3.1.src.rpm
spyder3-breakpoints-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-breakpoints-lang-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-dicom-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-doc-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-hdf5-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-lang-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-profiler-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-profiler-lang-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-pylint-3.2.8-lp150.2.3.1.noarch.rpm
spyder3-pylint-lang-3.2.8-lp150.2.3.1.noarch.rpm
openSUSE-2018-621
Recommended update for util-linux
moderate
openSUSE Leap 15.0 Update
This update for util-linux fixes the following issues:
- the rfkill-block@.service and rfkill-unblock@service were run in the package pre/postun scripts
despite only being templates without parameters (boo#1092820, boo#1093176)
python-libmount-2.31.1-lp150.7.3.1.src.rpm
python-libmount-2.31.1-lp150.7.3.1.x86_64.rpm
python-libmount-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
python-libmount-debugsource-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-systemd-2.31.1-lp150.7.3.1.src.rpm
util-linux-systemd-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-systemd-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-systemd-debugsource-2.31.1-lp150.7.3.1.x86_64.rpm
uuidd-2.31.1-lp150.7.3.1.x86_64.rpm
uuidd-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid1-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libfdisk-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libfdisk-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libfdisk1-2.31.1-lp150.7.3.1.x86_64.rpm
libfdisk1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libmount-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libmount-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libmount1-2.31.1-lp150.7.3.1.x86_64.rpm
libmount1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libsmartcols-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libsmartcols-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libsmartcols1-2.31.1-lp150.7.3.1.x86_64.rpm
libsmartcols1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid1-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-2.31.1-lp150.7.3.1.src.rpm
util-linux-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-debugsource-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-lang-2.31.1-lp150.7.3.1.noarch.rpm
util-linux-systemd-2.31.1-lp150.7.3.1.i586.rpm
util-linux-systemd-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
util-linux-systemd-debugsource-2.31.1-lp150.7.3.1.i586.rpm
uuidd-2.31.1-lp150.7.3.1.i586.rpm
uuidd-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libblkid-devel-2.31.1-lp150.7.3.1.i586.rpm
libblkid-devel-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libblkid1-2.31.1-lp150.7.3.1.i586.rpm
libblkid1-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid1-32bit-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libfdisk-devel-2.31.1-lp150.7.3.1.i586.rpm
libfdisk-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libfdisk1-2.31.1-lp150.7.3.1.i586.rpm
libfdisk1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libmount-devel-2.31.1-lp150.7.3.1.i586.rpm
libmount-devel-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libmount-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libmount1-2.31.1-lp150.7.3.1.i586.rpm
libmount1-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libmount1-32bit-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libmount1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libsmartcols-devel-2.31.1-lp150.7.3.1.i586.rpm
libsmartcols-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libsmartcols1-2.31.1-lp150.7.3.1.i586.rpm
libsmartcols1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libuuid-devel-2.31.1-lp150.7.3.1.i586.rpm
libuuid-devel-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libuuid1-2.31.1-lp150.7.3.1.i586.rpm
libuuid1-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid1-32bit-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
util-linux-2.31.1-lp150.7.3.1.i586.rpm
util-linux-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
util-linux-debugsource-2.31.1-lp150.7.3.1.i586.rpm
openSUSE-2018-624
Recommended update for systemd
important
openSUSE Leap 15.0 Update
This update for systemd fixes the following issues:
- Network did not start correctly when installing using a PCI network device (boo#1083158)
- User services should not be enabled by default (boo#1090785)
- udev: created /dev/disk/by-partlabel/primary and .../logical symlinks as these are contented names (boo#1089761)
libsystemd0-mini-234-lp150.20.3.1.x86_64.rpm
libsystemd0-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
libudev-mini-devel-234-lp150.20.3.1.x86_64.rpm
libudev-mini1-234-lp150.20.3.1.x86_64.rpm
libudev-mini1-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-mini-234-lp150.20.3.1.src.rpm
systemd-mini-234-lp150.20.3.1.x86_64.rpm
systemd-mini-bash-completion-234-lp150.20.3.1.noarch.rpm
systemd-mini-container-mini-234-lp150.20.3.1.x86_64.rpm
systemd-mini-container-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-mini-coredump-mini-234-lp150.20.3.1.x86_64.rpm
systemd-mini-coredump-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-mini-debugsource-234-lp150.20.3.1.x86_64.rpm
systemd-mini-devel-234-lp150.20.3.1.x86_64.rpm
systemd-mini-sysvinit-234-lp150.20.3.1.x86_64.rpm
udev-mini-234-lp150.20.3.1.x86_64.rpm
udev-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
libsystemd0-234-lp150.20.3.1.x86_64.rpm
libsystemd0-debuginfo-234-lp150.20.3.1.x86_64.rpm
libudev-devel-234-lp150.20.3.1.x86_64.rpm
libudev1-234-lp150.20.3.1.x86_64.rpm
libudev1-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-myhostname-234-lp150.20.3.1.x86_64.rpm
nss-myhostname-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-mymachines-234-lp150.20.3.1.x86_64.rpm
nss-mymachines-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-systemd-234-lp150.20.3.1.x86_64.rpm
nss-systemd-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-234-lp150.20.3.1.src.rpm
systemd-234-lp150.20.3.1.x86_64.rpm
systemd-bash-completion-234-lp150.20.3.1.noarch.rpm
systemd-container-234-lp150.20.3.1.x86_64.rpm
systemd-container-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-coredump-234-lp150.20.3.1.x86_64.rpm
systemd-coredump-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-debugsource-234-lp150.20.3.1.x86_64.rpm
systemd-devel-234-lp150.20.3.1.x86_64.rpm
systemd-logger-234-lp150.20.3.1.x86_64.rpm
systemd-sysvinit-234-lp150.20.3.1.x86_64.rpm
udev-234-lp150.20.3.1.x86_64.rpm
udev-debuginfo-234-lp150.20.3.1.x86_64.rpm
libsystemd0-mini-234-lp150.20.3.1.i586.rpm
libsystemd0-mini-debuginfo-234-lp150.20.3.1.i586.rpm
libudev-mini-devel-234-lp150.20.3.1.i586.rpm
libudev-mini1-234-lp150.20.3.1.i586.rpm
libudev-mini1-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-mini-234-lp150.20.3.1.i586.rpm
systemd-mini-container-mini-234-lp150.20.3.1.i586.rpm
systemd-mini-container-mini-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-mini-coredump-mini-234-lp150.20.3.1.i586.rpm
systemd-mini-coredump-mini-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-mini-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-mini-debugsource-234-lp150.20.3.1.i586.rpm
systemd-mini-devel-234-lp150.20.3.1.i586.rpm
systemd-mini-sysvinit-234-lp150.20.3.1.i586.rpm
udev-mini-234-lp150.20.3.1.i586.rpm
udev-mini-debuginfo-234-lp150.20.3.1.i586.rpm
libsystemd0-234-lp150.20.3.1.i586.rpm
libsystemd0-32bit-234-lp150.20.3.1.x86_64.rpm
libsystemd0-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
libsystemd0-debuginfo-234-lp150.20.3.1.i586.rpm
libudev-devel-234-lp150.20.3.1.i586.rpm
libudev-devel-32bit-234-lp150.20.3.1.x86_64.rpm
libudev1-234-lp150.20.3.1.i586.rpm
libudev1-32bit-234-lp150.20.3.1.x86_64.rpm
libudev1-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
libudev1-debuginfo-234-lp150.20.3.1.i586.rpm
nss-myhostname-234-lp150.20.3.1.i586.rpm
nss-myhostname-32bit-234-lp150.20.3.1.x86_64.rpm
nss-myhostname-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-myhostname-debuginfo-234-lp150.20.3.1.i586.rpm
nss-mymachines-234-lp150.20.3.1.i586.rpm
nss-mymachines-32bit-234-lp150.20.3.1.x86_64.rpm
nss-mymachines-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-mymachines-debuginfo-234-lp150.20.3.1.i586.rpm
nss-systemd-234-lp150.20.3.1.i586.rpm
nss-systemd-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-234-lp150.20.3.1.i586.rpm
systemd-32bit-234-lp150.20.3.1.x86_64.rpm
systemd-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-container-234-lp150.20.3.1.i586.rpm
systemd-container-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-coredump-234-lp150.20.3.1.i586.rpm
systemd-coredump-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-debugsource-234-lp150.20.3.1.i586.rpm
systemd-devel-234-lp150.20.3.1.i586.rpm
systemd-logger-234-lp150.20.3.1.i586.rpm
systemd-sysvinit-234-lp150.20.3.1.i586.rpm
udev-234-lp150.20.3.1.i586.rpm
udev-debuginfo-234-lp150.20.3.1.i586.rpm
openSUSE-2018-625
Recommended update for yast2-dns-server
moderate
openSUSE Leap 15.0 Update
This update for yast2-dns-server fixes the following issues:
- YaST DNS would reload named.service even when it was not running, resulting in an error (boo#1093029)
yast2-dns-server-4.0.2-lp150.2.3.1.noarch.rpm
yast2-dns-server-4.0.2-lp150.2.3.1.src.rpm
openSUSE-2018-626
Recommended update for yast2-installation
moderate
openSUSE Leap 15.0 Update
This update for yast2-installation fixes the following issues:
- Possible crash when multipath is not available (boo#1095323)
- On s390 important devices may be blocked when cio_ignore is active (boo#1095033)
- AutoYaST re-installation mode detection did not work correctly on DASK disks (boo#1089547)
yast2-installation-4.0.63-lp150.2.6.1.noarch.rpm
yast2-installation-4.0.63-lp150.2.6.1.src.rpm
openSUSE-2018-633
Recommended update for python-kiwi
moderate
openSUSE Leap 15.0 Update
This update for python-kiwi fixes the following issues:
- Adding 'additionaltags' containerconfig attribute to support multiple tags for containers
- Bugfix: Does no longer delete uncompressed base docker images
- Bugfix: Does no longer create static dev nodes in root init (bsc#1087104)
- Bugfix: Adds the initrd-root-fs.target service dependency to auto generated sysroot.mount for
kiwi-live and kiwi-overlay dracut modules.
- Adds a verification to check that the target file doesn't exist before creating a symlink
- Adds a documentation for config-cdroot archive
- Bugfix: Fix setup of LOADER_TYPE in sysconfig/bootloader (bsc#1094883)
dracut-kiwi-lib-9.15.3-lp150.2.6.1.x86_64.rpm
dracut-kiwi-live-9.15.3-lp150.2.6.1.x86_64.rpm
dracut-kiwi-oem-dump-9.15.3-lp150.2.6.1.x86_64.rpm
dracut-kiwi-oem-repart-9.15.3-lp150.2.6.1.x86_64.rpm
dracut-kiwi-overlay-9.15.3-lp150.2.6.1.x86_64.rpm
kiwi-man-pages-9.15.3-lp150.2.6.1.x86_64.rpm
kiwi-pxeboot-9.15.3-lp150.2.6.1.x86_64.rpm
kiwi-tools-9.15.3-lp150.2.6.1.x86_64.rpm
kiwi-tools-debuginfo-9.15.3-lp150.2.6.1.x86_64.rpm
python-kiwi-9.15.3-lp150.2.6.1.src.rpm
python-kiwi-debugsource-9.15.3-lp150.2.6.1.x86_64.rpm
python2-kiwi-9.15.3-lp150.2.6.1.x86_64.rpm
python3-kiwi-9.15.3-lp150.2.6.1.x86_64.rpm
dracut-kiwi-lib-9.15.3-lp150.2.6.1.i586.rpm
dracut-kiwi-live-9.15.3-lp150.2.6.1.i586.rpm
dracut-kiwi-oem-dump-9.15.3-lp150.2.6.1.i586.rpm
dracut-kiwi-oem-repart-9.15.3-lp150.2.6.1.i586.rpm
dracut-kiwi-overlay-9.15.3-lp150.2.6.1.i586.rpm
kiwi-man-pages-9.15.3-lp150.2.6.1.i586.rpm
kiwi-pxeboot-9.15.3-lp150.2.6.1.i586.rpm
kiwi-tools-9.15.3-lp150.2.6.1.i586.rpm
kiwi-tools-debuginfo-9.15.3-lp150.2.6.1.i586.rpm
python-kiwi-debugsource-9.15.3-lp150.2.6.1.i586.rpm
python2-kiwi-9.15.3-lp150.2.6.1.i586.rpm
python3-kiwi-9.15.3-lp150.2.6.1.i586.rpm
openSUSE-2018-634
Recommended update for salt
moderate
openSUSE Leap 15.0 Update
This update for salt fixes the following issues:
- Updates the documentation to 2018.3.0
- No more AWS EC2 rate limitations in salt-cloud (bsc#1088888)
- MySQL returner now also allows to use Unix sockets (bsc#1091371)
- Do not override jid on returners, only sending back to master (bsc#1092373)
- salt-ssh:
* Bugfix: Option --extra-filerefs doesn't add all files to the state archive
* Pillar completely overwritten (not merged) when doing module.run + state.apply
with pillar in kwargs
- Remove minion/thin/version if exists to force thin regeneration (bsc#1092161)
python2-salt-2018.3.0-lp150.3.3.1.x86_64.rpm
python3-salt-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-2018.3.0-lp150.3.3.1.src.rpm
salt-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-api-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-bash-completion-2018.3.0-lp150.3.3.1.noarch.rpm
salt-cloud-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-doc-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-fish-completion-2018.3.0-lp150.3.3.1.noarch.rpm
salt-master-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-minion-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-proxy-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-ssh-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-syndic-2018.3.0-lp150.3.3.1.x86_64.rpm
salt-zsh-completion-2018.3.0-lp150.3.3.1.noarch.rpm
openSUSE-2018-635
Recommended update for yast2-nfs-client
moderate
openSUSE Leap 15.0 Update
This update for yast2-nfs-client fixes the following issues:
- Fixed a regression that was preventing some strings to be translated.
- Do not crash when 'edit' button is pressed in the partitioner if there are no NFS entries
(affects installation, part of fate#318196).
- When executed standalone (not embedded in the Partitioner), use storage-ng to read and write
/etc/fstab, instead of the old buggy parser (boo#429326, bsc#1064437).
yast2-nfs-client-4.0.6-lp150.2.3.1.noarch.rpm
yast2-nfs-client-4.0.6-lp150.2.3.1.src.rpm
openSUSE-2018-639
Recommended update for pin
moderate
openSUSE Leap 15.0 Update
This update for pin fixes the following issues:
- Bugfix: pin was broken on systems without /etc/SuSE-release file (boo#1095723)
pin-0.38-lp150.2.3.1.noarch.rpm
pin-0.38-lp150.2.3.1.src.rpm
openSUSE-2018-657
Recommended update for switcheroo-control
moderate
openSUSE Leap 15.0 Update
This update for switcheroo-control fixes the following issues:
- Adds a service file for switcheroo-control (boo#1096823).
switcheroo-control-1.2-lp150.2.3.1.src.rpm
switcheroo-control-1.2-lp150.2.3.1.x86_64.rpm
switcheroo-control-debuginfo-1.2-lp150.2.3.1.x86_64.rpm
switcheroo-control-debugsource-1.2-lp150.2.3.1.x86_64.rpm
switcheroo-control-doc-1.2-lp150.2.3.1.noarch.rpm
openSUSE-2018-658
Recommended update for diskimage-builder
moderate
openSUSE Leap 15.0 Update
This is an update for diskimage-builder to version 2.15.1 including the following fixes/features:
Version 2.15.1 (boo#1097115):
- elements: pip-and-virtualenv: Handle openSUSE Leap 15
- Allow to rebuild arbitrary images
- Replace the ubuntu-minimal trusty test with a bionic one
- Remove non-maintained ubuntu-core element
- elements: zypper-minimal: Add support for openSUSE Leap 15.X
- Add support for Ubuntu 18.04
- Bugfix: Remove duplicate GRUB command line entry
- rpm-distro: set the contentdir yum var
- Fixes add-apt-keys in dpkg element
- Add pip cache cleanup to pip-and-virtualenv
- pip-and-virtualenv: fix install-pip when centos-release-openstack is enabled
diskimage-builder-2.15.1-lp150.2.3.1.noarch.rpm
diskimage-builder-2.15.1-lp150.2.3.1.src.rpm
openSUSE-2018-654
Security update for matrix-synapse
moderate
openSUSE Leap 15.0 Update
This update for matrix-synapse fixes the following security issue:
- CVE-2018-12291: visibility rules were not applied correctly in the get_missing_events federation API (boo#1096833)
matrix-synapse-0.28.1-lp150.2.4.1.src.rpm
python2-matrix-synapse-0.28.1-lp150.2.4.1.noarch.rpm
python3-matrix-synapse-0.28.1-lp150.2.4.1.noarch.rpm
matrix-synapse-test-0.28.1-lp150.2.4.1.src.rpm
openSUSE-2018-647
Recommended update for calibre
moderate
openSUSE Leap 15.0 Update
This update for calibre adds support for a number of e-book reads, amoung other improvements:
- Support Kobo Clara HD (boo#1097180)o
- Improve PDF output
- Various UI and e-book handling bug fixes
- Add option to output EPUB 3 files
calibre-3.25.0-lp150.3.3.1.src.rpm
calibre-3.25.0-lp150.3.3.1.x86_64.rpm
calibre-debuginfo-3.25.0-lp150.3.3.1.x86_64.rpm
calibre-debugsource-3.25.0-lp150.3.3.1.x86_64.rpm
openSUSE-2018-630
Security update for enigmail
moderate
openSUSE Leap 15.0 Update
This update for enigmail fixes vulnerabilities that allowed spoofing of e-mail signatures:
- CVE-2018-12019: signature spoofing via specially crafted OpenPGP user IDs (boo#1097525)
- CVE-2018-12020: signature spoofing via diagnostic output of the original file name in GnuPG verbose mode (boo#1096745)
This mitigation prevents CVE-2018-12020 from being exploited even if GnuPG is not patched.
enigmail-2.0.7-lp150.2.12.1.src.rpm
enigmail-2.0.7-lp150.2.12.1.x86_64.rpm
openSUSE-2018-646
Security update for python-python-gnupg
moderate
openSUSE Leap 15.0 Update
This update for python-python-gnupg to version 0.4.3 fixes the following issues:
The following security vulnerabilities were addressed:
- Sanitize diagnostic output of the original file name in verbose mode
(CVE-2018-12020 boo#1096745)
The following other changes were made:
- Add --no-verbose to the gpg command line, in case verbose is specified is
gpg.conf.
- Add expect_passphrase password for use on GnuPG >= 2.1 when passing
passphrase to gpg via pinentry
- Provide a trust_keys method to allow setting the trust level
for keys
- When the gpg executable is not found, note the path used in the
exception message
- Make error messages more informational
python-python-gnupg-0.4.3-lp150.2.3.1.src.rpm
python2-python-gnupg-0.4.3-lp150.2.3.1.noarch.rpm
python3-python-gnupg-0.4.3-lp150.2.3.1.noarch.rpm
openSUSE-2018-641
Security update for java-1_8_0-openjdk
important
openSUSE Leap 15.0 Update
This update for java-1_8_0-openjdk to version 8u171 fixes the following issues:
These security issues were fixed:
- S8180881: Better packaging of deserialization
- S8182362: Update CipherOutputStream Usage
- S8183032: Upgrade to LittleCMS 2.9
- S8189123: More consistent classloading
- S8189969, CVE-2018-2790, bsc#1090023: Manifest better manifest entries
- S8189977, CVE-2018-2795, bsc#1090025: Improve permission portability
- S8189981, CVE-2018-2796, bsc#1090026: Improve queuing portability
- S8189985, CVE-2018-2797, bsc#1090027: Improve tabular data portability
- S8189989, CVE-2018-2798, bsc#1090028: Improve container portability
- S8189993, CVE-2018-2799, bsc#1090029: Improve document portability
- S8189997, CVE-2018-2794, bsc#1090024: Enhance keystore mechanisms
- S8190478: Improved interface method selection
- S8190877: Better handling of abstract classes
- S8191696: Better mouse positioning
- S8192025, CVE-2018-2814, bsc#1090032: Less referential references
- S8192030: Better MTSchema support
- S8192757, CVE-2018-2815, bsc#1090033: Improve stub classes implementation
- S8193409: Improve AES supporting classes
- S8193414: Improvements in MethodType lookups
- S8193833, CVE-2018-2800, bsc#1090030: Better RMI connection support
For other changes please consult the changelog.
This update was imported from the SUSE:SLE-12-SP1:Update update project.
java-1_8_0-openjdk-1.8.0.171-lp150.2.3.1.src.rpm
java-1_8_0-openjdk-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-accessibility-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-debuginfo-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-debugsource-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-demo-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-devel-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-headless-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-javadoc-1.8.0.171-lp150.2.3.1.noarch.rpm
java-1_8_0-openjdk-src-1.8.0.171-lp150.2.3.1.x86_64.rpm
java-1_8_0-openjdk-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-accessibility-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-debuginfo-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-debugsource-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-demo-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-demo-debuginfo-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-devel-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-devel-debuginfo-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-headless-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-headless-debuginfo-1.8.0.171-lp150.2.3.1.i586.rpm
java-1_8_0-openjdk-src-1.8.0.171-lp150.2.3.1.i586.rpm
openSUSE-2018-640
Security update for gpg2
important
openSUSE Leap 15.0 Update
This update for gpg2 fixes the following security issue:
- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
verification actions, which allowed remote attackers to spoof the output that
GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2"
option (bsc#1096745)
gpg2-2.2.5-lp150.3.3.1.src.rpm
gpg2-2.2.5-lp150.3.3.1.x86_64.rpm
gpg2-debuginfo-2.2.5-lp150.3.3.1.x86_64.rpm
gpg2-debugsource-2.2.5-lp150.3.3.1.x86_64.rpm
gpg2-lang-2.2.5-lp150.3.3.1.noarch.rpm
gpg2-2.2.5-lp150.3.3.1.i586.rpm
gpg2-debuginfo-2.2.5-lp150.3.3.1.i586.rpm
gpg2-debugsource-2.2.5-lp150.3.3.1.i586.rpm
openSUSE-2018-667
Security update for redis
important
openSUSE Leap 15.0 Update
This update for redis to 4.0.10 fixes the following issues:
These security issues were fixed:
- CVE-2018-11218: Prevent heap corruption vulnerability in cmsgpack (bsc#1097430).
- CVE-2018-11219: Prevent integer overflow in Lua scripting (bsc#1097768).
For Leap 42.3 and openSUSE SLE 12 backports this is a jump from 4.0.6. For
additional details please see
- https://raw.githubusercontent.com/antirez/redis/4.0.9/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/4.0.8/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/4.0.7/00-RELEASENOTES
redis-4.0.10-lp150.3.3.1.src.rpm
redis-4.0.10-lp150.3.3.1.x86_64.rpm
redis-debuginfo-4.0.10-lp150.3.3.1.x86_64.rpm
redis-debugsource-4.0.10-lp150.3.3.1.x86_64.rpm
openSUSE-2018-672
Security update for go1.9
moderate
openSUSE Leap 15.0 Update
This update for go1.9 fixes the following issues:
Security issues fixed:
- CVE-2018-7187: arbitrary command execution via VCS path (boo#1081495)
Non-security changes:
- Update to version 1.9.7
- fixes to the go command and compiler
- minimal support to the go command for the vgo transition
go-1.9.7-lp150.2.4.1.src.rpm
go-1.9.7-lp150.2.4.1.x86_64.rpm
go-doc-1.9.7-lp150.2.4.1.x86_64.rpm
go-race-1.9.7-lp150.2.4.1.x86_64.rpm
go1.9-1.9.7-lp150.2.4.2.src.rpm
go1.9-1.9.7-lp150.2.4.2.x86_64.rpm
go1.9-doc-1.9.7-lp150.2.4.2.x86_64.rpm
go1.9-race-1.9.7-lp150.2.4.2.x86_64.rpm
go-1.9.7-lp150.2.4.1.i586.rpm
go-doc-1.9.7-lp150.2.4.1.i586.rpm
go1.9-1.9.7-lp150.2.4.2.i586.rpm
go1.9-doc-1.9.7-lp150.2.4.2.i586.rpm
openSUSE-2018-673
Recommended update for hg-git
moderate
openSUSE Leap 15.0 Update
This update for hg-git fixes the following issues:
- hg-git was incompatible with mercurial 4.5 (boo#1096561)
This update to version 0.8.11 also contains the following changes:
- add config knob for marking git branches public
- re-enable support for git subrepositories
hg-git-0.8.11-lp150.2.3.1.noarch.rpm
hg-git-0.8.11-lp150.2.3.1.src.rpm
openSUSE-2018-666
Recommended update for perl-Finance-Quote
moderate
openSUSE Leap 15.0 Update
This update for perl-Finance-Quote fixes the following issues:
- GnuCash was no longer able to retrieve pricing information for various securities (boo#1077300)
perl-Finance-Quote-1.47-lp150.2.3.1.noarch.rpm
perl-Finance-Quote-1.47-lp150.2.3.1.src.rpm
openSUSE-2018-671
Recommended update for hylafax+
important
openSUSE Leap 15.0 Update
This update for hylafax+ fixes the following issues:
- hylafax+ failed to start with message '550 Cannot set privileges' (boo#1091476)
hylafax+-5.5.9-lp150.5.3.1.src.rpm
hylafax+-5.5.9-lp150.5.3.1.x86_64.rpm
hylafax+-client-5.5.9-lp150.5.3.1.x86_64.rpm
hylafax+-client-debuginfo-5.5.9-lp150.5.3.1.x86_64.rpm
hylafax+-debuginfo-5.5.9-lp150.5.3.1.x86_64.rpm
hylafax+-debugsource-5.5.9-lp150.5.3.1.x86_64.rpm
libfaxutil5_5_9-5.5.9-lp150.5.3.1.x86_64.rpm
libfaxutil5_5_9-debuginfo-5.5.9-lp150.5.3.1.x86_64.rpm
openSUSE-2018-689
Security update for GraphicsMagick
low
openSUSE Leap 15.0 Update
This update for GraphicsMagick fixes the following issues:
The following security fixes were fixed:
- CVE-2018-10805: Fixed a memory leak in ReadYCBCRImage in coders/ycbcr.c and
rgb.c, cmyk.c and gray.c (boo#1095812)
- Fixed invalid memory reads in dcm.c (boo#1075821#c14)
GraphicsMagick-1.3.29-lp150.3.6.1.src.rpm
GraphicsMagick-1.3.29-lp150.3.6.1.x86_64.rpm
GraphicsMagick-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm
GraphicsMagick-debugsource-1.3.29-lp150.3.6.1.x86_64.rpm
GraphicsMagick-devel-1.3.29-lp150.3.6.1.x86_64.rpm
libGraphicsMagick++-Q16-12-1.3.29-lp150.3.6.1.x86_64.rpm
libGraphicsMagick++-Q16-12-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm
libGraphicsMagick++-devel-1.3.29-lp150.3.6.1.x86_64.rpm
libGraphicsMagick-Q16-3-1.3.29-lp150.3.6.1.x86_64.rpm
libGraphicsMagick-Q16-3-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm
libGraphicsMagick3-config-1.3.29-lp150.3.6.1.x86_64.rpm
libGraphicsMagickWand-Q16-2-1.3.29-lp150.3.6.1.x86_64.rpm
libGraphicsMagickWand-Q16-2-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm
perl-GraphicsMagick-1.3.29-lp150.3.6.1.x86_64.rpm
perl-GraphicsMagick-debuginfo-1.3.29-lp150.3.6.1.x86_64.rpm
openSUSE-2018-679
Recommended update for kwayland
moderate
openSUSE Leap 15.0 Update
This update for kwayland fixes the following issues:
- Under Wayland, copy-past from GTK3 applications did not work (boo#1097606)
kwayland-5.45.0-lp150.2.3.1.src.rpm
kwayland-5.45.0-lp150.2.3.1.x86_64.rpm
kwayland-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
kwayland-debugsource-5.45.0-lp150.2.3.1.x86_64.rpm
kwayland-devel-5.45.0-lp150.2.3.1.x86_64.rpm
kwayland-devel-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
kwayland-32bit-5.45.0-lp150.2.3.1.x86_64.rpm
kwayland-32bit-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
kwayland-5.45.0-lp150.2.3.1.i586.rpm
kwayland-debuginfo-5.45.0-lp150.2.3.1.i586.rpm
kwayland-debugsource-5.45.0-lp150.2.3.1.i586.rpm
kwayland-devel-32bit-5.45.0-lp150.2.3.1.x86_64.rpm
kwayland-devel-32bit-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
kwayland-devel-5.45.0-lp150.2.3.1.i586.rpm
kwayland-devel-debuginfo-5.45.0-lp150.2.3.1.i586.rpm
openSUSE-2018-670
Recommended update for VirtualGL
moderate
openSUSE Leap 15.0 Update
This update for VirtualGL fixes the following issues:
- VirtualGL would pick up the Nvidia OpenGL library to environment files which changed the preload order (boo#1097210)
VirtualGL-2.5.2-lp150.2.3.1.src.rpm
VirtualGL-2.5.2-lp150.2.3.1.x86_64.rpm
VirtualGL-debuginfo-2.5.2-lp150.2.3.1.x86_64.rpm
VirtualGL-debugsource-2.5.2-lp150.2.3.1.x86_64.rpm
VirtualGL-devel-2.5.2-lp150.2.3.1.x86_64.rpm
VirtualGL-2.5.2-lp150.2.3.1.i586.rpm
VirtualGL-32bit-2.5.2-lp150.2.3.1.x86_64.rpm
VirtualGL-32bit-debuginfo-2.5.2-lp150.2.3.1.x86_64.rpm
VirtualGL-debuginfo-2.5.2-lp150.2.3.1.i586.rpm
VirtualGL-debugsource-2.5.2-lp150.2.3.1.i586.rpm
VirtualGL-devel-2.5.2-lp150.2.3.1.i586.rpm
openSUSE-2018-680
Recommended update for libXaw
moderate
openSUSE Leap 15.0 Update
This update for libXaw fixes the following issues:
- a segmentation fault may have occurred in xen PV domU during a live migration
if a required font was not installed (boo#1098411)
libXaw-1.0.13-lp150.2.3.1.src.rpm
libXaw-debugsource-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw-devel-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw6-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw6-debuginfo-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw7-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw7-debuginfo-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw8-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw-debugsource-1.0.13-lp150.2.3.1.i586.rpm
libXaw-devel-1.0.13-lp150.2.3.1.i586.rpm
libXaw-devel-32bit-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw6-1.0.13-lp150.2.3.1.i586.rpm
libXaw6-32bit-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw6-32bit-debuginfo-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw6-debuginfo-1.0.13-lp150.2.3.1.i586.rpm
libXaw7-1.0.13-lp150.2.3.1.i586.rpm
libXaw7-32bit-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw7-32bit-debuginfo-1.0.13-lp150.2.3.1.x86_64.rpm
libXaw7-debuginfo-1.0.13-lp150.2.3.1.i586.rpm
libXaw8-1.0.13-lp150.2.3.1.i586.rpm
libXaw8-32bit-1.0.13-lp150.2.3.1.x86_64.rpm
openSUSE-2018-669
Security update for phpMyAdmin
important
openSUSE Leap 15.0 Update
This update for phpMyAdmin fixes multiple issues.
Security issues fixed:
* CVE-2018-12613: File inclusion and remote code execution attack (boo#1098751)
* CVE-2018-12581: XSS in Designer feature (boo#1098752)
This update to version 4.8.2 also contains number of upstream bug fixes and improvements.
phpMyAdmin-4.8.2-lp150.2.3.1.noarch.rpm
phpMyAdmin-4.8.2-lp150.2.3.1.src.rpm
openSUSE-2018-681
Recommended update for putty
moderate
openSUSE Leap 15.0 Update
This update for putty fixes the following issues:
- putty did not start under Wayland (boo#1098962)
putty-0.70-lp150.4.3.1.src.rpm
putty-0.70-lp150.4.3.1.x86_64.rpm
putty-debuginfo-0.70-lp150.4.3.1.x86_64.rpm
putty-debugsource-0.70-lp150.4.3.1.x86_64.rpm
openSUSE-2018-682
Optional update for znc
moderate
openSUSE Leap 15.0 Update
This optional update makes available znc version 1.7.0 with multiple useful features:
- Implement IRCv3.2 capabilities away-notify, account-notify, extended-join
- Implement IRCv3.2 capabilities echo-message, cap-notify on the "client side"
- Update capability names as they are named in IRCv3.2
- Make ZNC request server-time from server when available (#839)
- Increase accepted line length from 1024 to 2048 to give some space to message tags
- Support separate SSLKeyFile and SSLDHParamFile configuration in addition to existing SSLCertFile
- Add modules: pyeval, stripcontrols
- Add new substitutions to ExpandString: %empty% and %network%
- Add ClearAllBuffers command
- Set HttpOnly and SameSite=strict for session cookies
- Add SNI SSL client support (#1200)
- Add support for CIDR notation in allowed hosts list and in trusted proxy list
- Add network-specific config for cert validation in addition to user-supplied fingerprints
- Add /attach command for symmetry with /detach
znc-1.7.0-lp150.2.3.1.src.rpm
znc-1.7.0-lp150.2.3.1.x86_64.rpm
znc-debuginfo-1.7.0-lp150.2.3.1.x86_64.rpm
znc-debugsource-1.7.0-lp150.2.3.1.x86_64.rpm
znc-devel-1.7.0-lp150.2.3.1.x86_64.rpm
znc-lang-1.7.0-lp150.2.3.1.noarch.rpm
znc-perl-1.7.0-lp150.2.3.1.x86_64.rpm
znc-perl-debuginfo-1.7.0-lp150.2.3.1.x86_64.rpm
znc-python3-1.7.0-lp150.2.3.1.x86_64.rpm
znc-python3-debuginfo-1.7.0-lp150.2.3.1.x86_64.rpm
znc-tcl-1.7.0-lp150.2.3.1.x86_64.rpm
znc-tcl-debuginfo-1.7.0-lp150.2.3.1.x86_64.rpm
openSUSE-2018-678
Recommended update for wireless-regdb
moderate
openSUSE Leap 15.0 Update
This update for wireless-regdb to version 2018.05.09 provides the following fixes: (bsc#1095397)
- Updated regulatory database for France and Panama.
- Fixes in python3 scripts.
This update was imported from the SUSE:SLE-12:Update update project.
wireless-regdb-2018.05.09-lp150.2.3.1.noarch.rpm
wireless-regdb-2018.05.09-lp150.2.3.1.src.rpm
openSUSE-2018-676
Security update for MozillaFirefox
important
openSUSE Leap 15.0 Update
This security update for MozillaFirefox to version 60.1.0esr fixes multiple issues.
Security issues fixed (MFSA 2018-16, boo#1098998):
- CVE-2018-12359: Buffer overflow using computed size of canvas element
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-12361: Integer overflow in SwizzleData
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12371: Integer overflow in Skia library during edge builder allocation
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming
- CVE-2018-12369: WebExtension security permission checks bypassed by embedded experiments
- CVE-2018-5187: Memory safety bugs fixed in Firefox 60 and Firefox ESR 60.1
- CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, and Firefox ESR 52.9
Other issues fixed:
- various stability and regression fixes
- do not disable system installed unsigned language packs (bmo#1464766)
MozillaFirefox-60.1.0-lp150.3.11.1.src.rpm
MozillaFirefox-60.1.0-lp150.3.11.1.x86_64.rpm
MozillaFirefox-branding-upstream-60.1.0-lp150.3.11.1.x86_64.rpm
MozillaFirefox-buildsymbols-60.1.0-lp150.3.11.1.x86_64.rpm
MozillaFirefox-debuginfo-60.1.0-lp150.3.11.1.x86_64.rpm
MozillaFirefox-debugsource-60.1.0-lp150.3.11.1.x86_64.rpm
MozillaFirefox-devel-60.1.0-lp150.3.11.1.x86_64.rpm
MozillaFirefox-translations-common-60.1.0-lp150.3.11.1.x86_64.rpm
MozillaFirefox-translations-other-60.1.0-lp150.3.11.1.x86_64.rpm
openSUSE-2018-691
Security update for mailman
moderate
openSUSE Leap 15.0 Update
This update for mailman to version 2.1.27 fixes the following issues:
This security issue was fixed:
- CVE-2018-0618: Additional protections against injecting scripts into listinfo
and error messages pages (bsc#1099510).
These non-security issues were fixed:
- The hash generated when SUBSCRIBE_FORM_SECRET is set could have been
the same as one generated at the same time for a different list and
IP address.
- An option has been added to bin/add_members to issue invitations
instead of immediately adding members.
- A new BLOCK_SPAMHAUS_LISTED_IP_SUBSCRIBE setting has been added to
enable blocking web subscribes from IPv4 addresses listed in Spamhaus
SBL, CSS or XBL. It will work with IPv6 addresses if Python's
py2-ipaddress module is installed. The module can be installed via pip
if not included in your Python.
- Mailman has a new 'security' log and logs authentication failures to the
various web CGI functions. The logged data include the remote IP and can be
used to automate blocking of IPs with something like fail2ban. Since Mailman
2.1.14, these have returned an http 401 status and the information should be
logged by the web server, but this new log makes that more convenient. Also,
the 'mischief' log entries for 'hostile listname' noe include the remote IP
if available.
- admin notices of (un)subscribes now may give
the source of the action. This consists of a %(whence)s replacement
that has been added to the admin(un)subscribeack.txt templates. Thanks
to Yasuhito FUTATSUKI for updating the non-English templates and help
with internationalizing the reasons.
- there is a new BLOCK_SPAMHAUS_LISTED_DBL_SUBSCRIBE setting to enable blocking
web subscribes for addresses in domains listed in the Spamhaus DBL.
mailman-2.1.27-lp150.2.3.1.src.rpm
mailman-2.1.27-lp150.2.3.1.x86_64.rpm
mailman-debuginfo-2.1.27-lp150.2.3.1.x86_64.rpm
mailman-debugsource-2.1.27-lp150.2.3.1.x86_64.rpm
openSUSE-2018-692
Recommended update for spec-cleaner
moderate
openSUSE Leap 15.0 Update
This update for spec-cleaner fixes the following issues (boo#1099674):
- An error was reported on parsing non-utf spec-file
- Move some checks from rpmlint to be autochecked
- Use Leap 15.0 as base for conversions to pkgconfig/etc
spec-cleaner-1.1.0-lp150.2.5.1.noarch.rpm
spec-cleaner-1.1.0-lp150.2.5.1.src.rpm
spec-cleaner-format_spec_file-1.1.0-lp150.2.5.1.noarch.rpm
openSUSE-2018-695
Recommended update for curl
moderate
openSUSE Leap 15.0 Update
This update for curl provides the following fix:
- Use OPENSSL_config() instead of CONF_modules_load_file() to avoid crashes due to conflicting
openssl engines. (bsc#1086367)
This update was imported from the SUSE:SLE-15:Update update project.
curl-mini-7.60.0-lp150.2.6.1.src.rpm
curl-mini-7.60.0-lp150.2.6.1.x86_64.rpm
curl-mini-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm
curl-mini-debugsource-7.60.0-lp150.2.6.1.x86_64.rpm
libcurl-mini-devel-7.60.0-lp150.2.6.1.x86_64.rpm
libcurl4-mini-7.60.0-lp150.2.6.1.x86_64.rpm
libcurl4-mini-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm
curl-7.60.0-lp150.2.6.1.src.rpm
curl-7.60.0-lp150.2.6.1.x86_64.rpm
curl-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm
curl-debugsource-7.60.0-lp150.2.6.1.x86_64.rpm
libcurl-devel-7.60.0-lp150.2.6.1.x86_64.rpm
libcurl4-7.60.0-lp150.2.6.1.x86_64.rpm
libcurl4-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm
curl-mini-7.60.0-lp150.2.6.1.i586.rpm
curl-mini-debuginfo-7.60.0-lp150.2.6.1.i586.rpm
curl-mini-debugsource-7.60.0-lp150.2.6.1.i586.rpm
libcurl-mini-devel-7.60.0-lp150.2.6.1.i586.rpm
libcurl4-mini-7.60.0-lp150.2.6.1.i586.rpm
libcurl4-mini-debuginfo-7.60.0-lp150.2.6.1.i586.rpm
curl-7.60.0-lp150.2.6.1.i586.rpm
curl-debuginfo-7.60.0-lp150.2.6.1.i586.rpm
curl-debugsource-7.60.0-lp150.2.6.1.i586.rpm
libcurl-devel-32bit-7.60.0-lp150.2.6.1.x86_64.rpm
libcurl-devel-7.60.0-lp150.2.6.1.i586.rpm
libcurl4-32bit-7.60.0-lp150.2.6.1.x86_64.rpm
libcurl4-32bit-debuginfo-7.60.0-lp150.2.6.1.x86_64.rpm
libcurl4-7.60.0-lp150.2.6.1.i586.rpm
libcurl4-debuginfo-7.60.0-lp150.2.6.1.i586.rpm