openSUSE-2018-486
Security update for Mozilla Thunderbird
important
openSUSE Leap 15.0 Update
This update for Mozilla Thunderbird to version 52.8 fixes the following issues:
Security issues fixed (MFSA 2018-13, boo#1092548):
- CVE-2018-5183: Backport critical security fixes in Skia
- CVE-2018-5154: Use-after-free with SVG animations and clip paths
- CVE-2018-5155: Use-after-free with SVG animations and text paths
- CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
- CVE-2018-5168: Lightweight themes can be installed without user interaction
- CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
- CVE-2018-5150: Memory safety bugs fixed in Firefox 60, Firefox ESR 52.8, and Thunderbird 52.8
- CVE-2018-5161: Hang via malformed headers (bsc#1093970)
- CVE-2018-5162: Encrypted mail leaks plaintext through src attribute (bsc#1093971)
- CVE-2018-5170: Filename spoofing for external attachments (bsc#1093972)
- CVE-2018-5184: Full plaintext recovery in S/MIME via chosen-ciphertext attack (bsc#1093969)
- CVE-2018-5185: Leaking plaintext through HTML forms (bsc#1093973)
MozillaThunderbird-52.8-lp150.3.3.2.src.rpm
MozillaThunderbird-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-buildsymbols-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-debuginfo-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-debugsource-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-devel-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-translations-common-52.8-lp150.3.3.2.x86_64.rpm
MozillaThunderbird-translations-other-52.8-lp150.3.3.2.x86_64.rpm
openSUSE-2018-473
Recommended update for timezone, timezone-java
low
openSUSE Leap 15.0 Update
This update provides the latest timezone information (2018e) for your system, including following changes:
- North Korea switches back from +0830 to +09 on 2018-05-05.
- Ireland's standard time is in the summer, with negative DST
offset to standard time used in Winter (bsc#1073299)
timezone-java-2018e-lp150.2.3.3.noarch.rpm
timezone-java-2018e-lp150.2.3.3.src.rpm
timezone-2018e-lp150.2.3.3.src.rpm
timezone-2018e-lp150.2.3.3.x86_64.rpm
timezone-debuginfo-2018e-lp150.2.3.3.x86_64.rpm
timezone-debugsource-2018e-lp150.2.3.3.x86_64.rpm
timezone-2018e-lp150.2.3.3.i586.rpm
timezone-debuginfo-2018e-lp150.2.3.3.i586.rpm
timezone-debugsource-2018e-lp150.2.3.3.i586.rpm
openSUSE-2018-474
Security update for enigmail
moderate
openSUSE Leap 15.0 Update
This update for enigmail fixes multiple issues.
Security issues fixed:
- CVE-2017-17688: CFB gadget attacks allowed to exfiltrate plaintext out of encrypted emails.
enigmail now fails on GnuPG integrity check warnings for old Algorithms (bsc#1093151)
- CVE-2017-17689: CBC gadget attacks allows to exfiltrate plaintext out of encrypted emails (bsc#1093152)
enigmail-2.0.4-lp150.2.3.1.src.rpm
enigmail-2.0.4-lp150.2.3.1.x86_64.rpm
openSUSE-2018-512
Recommended update for MozillaFirefox
low
openSUSE Leap 15.0 Update
This update for MozillaFirefox to version 60.0.1 ESR fixes the following issues:
- Avoid overly long cycle collector pauses with some add-ons installed
- After unckecking the "Sponsored Stories" option, the New Tab page
now immediately stops displaying "Sponsored content" cards
- Use the right default background when opening tabs or windows in high contrast mode
- Restored translations of the Preferences panels when using a language pack
MozillaFirefox-60.0.1-lp150.3.3.2.src.rpm
MozillaFirefox-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-branding-upstream-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-buildsymbols-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-debuginfo-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-debugsource-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-devel-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-translations-common-60.0.1-lp150.3.3.2.x86_64.rpm
MozillaFirefox-translations-other-60.0.1-lp150.3.3.2.x86_64.rpm
openSUSE-2018-510
Recommended update for prosody
moderate
openSUSE Leap 15.0 Update
This update for prosody to version 0.10.1 fixes the following issues (boo#1093671):
- Ensure user archives are purged when a user account is deleted
- Various other upstream bug fixes and improvements
prosody-0.10.1-lp150.3.3.1.src.rpm
prosody-0.10.1-lp150.3.3.1.x86_64.rpm
prosody-debuginfo-0.10.1-lp150.3.3.1.x86_64.rpm
prosody-debugsource-0.10.1-lp150.3.3.1.x86_64.rpm
openSUSE-2018-485
Recommended update for php7
low
openSUSE Leap 15.0 Update
This update for php7 fixes the following issues:
- boo#1093025 main package requires wwwrun:www user
- better workaround for [boo#1089487]: build mod_phpN.so
instead of libphpN.so
apache2-mod_php7-7.2.5-lp150.2.3.1.x86_64.rpm
apache2-mod_php7-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-7.2.5-lp150.2.3.1.src.rpm
php7-7.2.5-lp150.2.3.1.x86_64.rpm
php7-bcmath-7.2.5-lp150.2.3.1.x86_64.rpm
php7-bcmath-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-bz2-7.2.5-lp150.2.3.1.x86_64.rpm
php7-bz2-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-calendar-7.2.5-lp150.2.3.1.x86_64.rpm
php7-calendar-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ctype-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ctype-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-curl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-curl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-dba-7.2.5-lp150.2.3.1.x86_64.rpm
php7-dba-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-debugsource-7.2.5-lp150.2.3.1.x86_64.rpm
php7-devel-7.2.5-lp150.2.3.1.x86_64.rpm
php7-dom-7.2.5-lp150.2.3.1.x86_64.rpm
php7-dom-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-embed-7.2.5-lp150.2.3.1.x86_64.rpm
php7-embed-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-enchant-7.2.5-lp150.2.3.1.x86_64.rpm
php7-enchant-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-exif-7.2.5-lp150.2.3.1.x86_64.rpm
php7-exif-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fastcgi-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fastcgi-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fileinfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fileinfo-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-firebird-7.2.5-lp150.2.3.1.x86_64.rpm
php7-firebird-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fpm-7.2.5-lp150.2.3.1.x86_64.rpm
php7-fpm-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ftp-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ftp-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gd-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gd-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gettext-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gettext-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gmp-7.2.5-lp150.2.3.1.x86_64.rpm
php7-gmp-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-iconv-7.2.5-lp150.2.3.1.x86_64.rpm
php7-iconv-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-intl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-intl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-json-7.2.5-lp150.2.3.1.x86_64.rpm
php7-json-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ldap-7.2.5-lp150.2.3.1.x86_64.rpm
php7-ldap-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-mbstring-7.2.5-lp150.2.3.1.x86_64.rpm
php7-mbstring-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-mysql-7.2.5-lp150.2.3.1.x86_64.rpm
php7-mysql-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-odbc-7.2.5-lp150.2.3.1.x86_64.rpm
php7-odbc-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-opcache-7.2.5-lp150.2.3.1.x86_64.rpm
php7-opcache-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-openssl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-openssl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pcntl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pcntl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pdo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pdo-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pear-7.2.5-lp150.2.3.1.noarch.rpm
php7-pear-Archive_Tar-7.2.5-lp150.2.3.1.noarch.rpm
php7-pgsql-7.2.5-lp150.2.3.1.x86_64.rpm
php7-pgsql-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-phar-7.2.5-lp150.2.3.1.x86_64.rpm
php7-phar-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-posix-7.2.5-lp150.2.3.1.x86_64.rpm
php7-posix-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-readline-7.2.5-lp150.2.3.1.x86_64.rpm
php7-readline-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-shmop-7.2.5-lp150.2.3.1.x86_64.rpm
php7-shmop-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-snmp-7.2.5-lp150.2.3.1.x86_64.rpm
php7-snmp-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-soap-7.2.5-lp150.2.3.1.x86_64.rpm
php7-soap-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sockets-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sockets-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sodium-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sodium-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sqlite-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sqlite-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvmsg-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvmsg-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvsem-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvsem-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvshm-7.2.5-lp150.2.3.1.x86_64.rpm
php7-sysvshm-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-tidy-7.2.5-lp150.2.3.1.x86_64.rpm
php7-tidy-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-tokenizer-7.2.5-lp150.2.3.1.x86_64.rpm
php7-tokenizer-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-wddx-7.2.5-lp150.2.3.1.x86_64.rpm
php7-wddx-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlreader-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlreader-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlrpc-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlrpc-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlwriter-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xmlwriter-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xsl-7.2.5-lp150.2.3.1.x86_64.rpm
php7-xsl-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-zip-7.2.5-lp150.2.3.1.x86_64.rpm
php7-zip-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
php7-zlib-7.2.5-lp150.2.3.1.x86_64.rpm
php7-zlib-debuginfo-7.2.5-lp150.2.3.1.x86_64.rpm
apache2-mod_php7-7.2.5-lp150.2.3.1.i586.rpm
apache2-mod_php7-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-7.2.5-lp150.2.3.1.i586.rpm
php7-bcmath-7.2.5-lp150.2.3.1.i586.rpm
php7-bcmath-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-bz2-7.2.5-lp150.2.3.1.i586.rpm
php7-bz2-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-calendar-7.2.5-lp150.2.3.1.i586.rpm
php7-calendar-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-ctype-7.2.5-lp150.2.3.1.i586.rpm
php7-ctype-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-curl-7.2.5-lp150.2.3.1.i586.rpm
php7-curl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-dba-7.2.5-lp150.2.3.1.i586.rpm
php7-dba-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-debugsource-7.2.5-lp150.2.3.1.i586.rpm
php7-devel-7.2.5-lp150.2.3.1.i586.rpm
php7-dom-7.2.5-lp150.2.3.1.i586.rpm
php7-dom-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-embed-7.2.5-lp150.2.3.1.i586.rpm
php7-embed-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-enchant-7.2.5-lp150.2.3.1.i586.rpm
php7-enchant-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-exif-7.2.5-lp150.2.3.1.i586.rpm
php7-exif-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-fastcgi-7.2.5-lp150.2.3.1.i586.rpm
php7-fastcgi-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-fileinfo-7.2.5-lp150.2.3.1.i586.rpm
php7-fileinfo-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-firebird-7.2.5-lp150.2.3.1.i586.rpm
php7-firebird-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-fpm-7.2.5-lp150.2.3.1.i586.rpm
php7-fpm-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-ftp-7.2.5-lp150.2.3.1.i586.rpm
php7-ftp-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-gd-7.2.5-lp150.2.3.1.i586.rpm
php7-gd-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-gettext-7.2.5-lp150.2.3.1.i586.rpm
php7-gettext-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-gmp-7.2.5-lp150.2.3.1.i586.rpm
php7-gmp-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-iconv-7.2.5-lp150.2.3.1.i586.rpm
php7-iconv-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-intl-7.2.5-lp150.2.3.1.i586.rpm
php7-intl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-json-7.2.5-lp150.2.3.1.i586.rpm
php7-json-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-ldap-7.2.5-lp150.2.3.1.i586.rpm
php7-ldap-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-mbstring-7.2.5-lp150.2.3.1.i586.rpm
php7-mbstring-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-mysql-7.2.5-lp150.2.3.1.i586.rpm
php7-mysql-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-odbc-7.2.5-lp150.2.3.1.i586.rpm
php7-odbc-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-opcache-7.2.5-lp150.2.3.1.i586.rpm
php7-opcache-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-openssl-7.2.5-lp150.2.3.1.i586.rpm
php7-openssl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-pcntl-7.2.5-lp150.2.3.1.i586.rpm
php7-pcntl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-pdo-7.2.5-lp150.2.3.1.i586.rpm
php7-pdo-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-pgsql-7.2.5-lp150.2.3.1.i586.rpm
php7-pgsql-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-phar-7.2.5-lp150.2.3.1.i586.rpm
php7-phar-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-posix-7.2.5-lp150.2.3.1.i586.rpm
php7-posix-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-readline-7.2.5-lp150.2.3.1.i586.rpm
php7-readline-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-shmop-7.2.5-lp150.2.3.1.i586.rpm
php7-shmop-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-snmp-7.2.5-lp150.2.3.1.i586.rpm
php7-snmp-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-soap-7.2.5-lp150.2.3.1.i586.rpm
php7-soap-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sockets-7.2.5-lp150.2.3.1.i586.rpm
php7-sockets-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sodium-7.2.5-lp150.2.3.1.i586.rpm
php7-sodium-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sqlite-7.2.5-lp150.2.3.1.i586.rpm
php7-sqlite-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvmsg-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvmsg-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvsem-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvsem-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvshm-7.2.5-lp150.2.3.1.i586.rpm
php7-sysvshm-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-tidy-7.2.5-lp150.2.3.1.i586.rpm
php7-tidy-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-tokenizer-7.2.5-lp150.2.3.1.i586.rpm
php7-tokenizer-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-wddx-7.2.5-lp150.2.3.1.i586.rpm
php7-wddx-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlreader-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlreader-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlrpc-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlrpc-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlwriter-7.2.5-lp150.2.3.1.i586.rpm
php7-xmlwriter-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-xsl-7.2.5-lp150.2.3.1.i586.rpm
php7-xsl-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-zip-7.2.5-lp150.2.3.1.i586.rpm
php7-zip-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
php7-zlib-7.2.5-lp150.2.3.1.i586.rpm
php7-zlib-debuginfo-7.2.5-lp150.2.3.1.i586.rpm
openSUSE-2018-483
Recommended update for vsftpd
important
openSUSE Leap 15.0 Update
This update for vsftpd fixes the following issue:
- boo#1089088: vsftpd did not work if seccomp was enabled
vsftpd-3.0.3-lp150.5.3.1.src.rpm
vsftpd-3.0.3-lp150.5.3.1.x86_64.rpm
vsftpd-debuginfo-3.0.3-lp150.5.3.1.x86_64.rpm
vsftpd-debugsource-3.0.3-lp150.5.3.1.x86_64.rpm
vsftpd-3.0.3-lp150.5.3.1.i586.rpm
vsftpd-debuginfo-3.0.3-lp150.5.3.1.i586.rpm
vsftpd-debugsource-3.0.3-lp150.5.3.1.i586.rpm
openSUSE-2018-484
Recommended update for psmisc
moderate
openSUSE Leap 15.0 Update
This update for psmisc fixes the following issues:
- boo#1093665: fuser -m did not work for private mounts
psmisc-23.0-lp150.4.3.1.src.rpm
psmisc-23.0-lp150.4.3.1.x86_64.rpm
psmisc-debuginfo-23.0-lp150.4.3.1.x86_64.rpm
psmisc-debugsource-23.0-lp150.4.3.1.x86_64.rpm
psmisc-lang-23.0-lp150.4.3.1.noarch.rpm
psmisc-23.0-lp150.4.3.1.i586.rpm
psmisc-debuginfo-23.0-lp150.4.3.1.i586.rpm
psmisc-debugsource-23.0-lp150.4.3.1.i586.rpm
openSUSE-2018-482
Recommended update for snapper
moderate
openSUSE Leap 15.0 Update
This update for snapper fixes the following issues:
- boo#1092103: snapper printed a warning related to non-UTF8 locales.
The warning was moved to the documentation.
libsnapper-devel-0.5.4-lp150.3.3.1.x86_64.rpm
libsnapper4-0.5.4-lp150.3.3.1.x86_64.rpm
libsnapper4-debuginfo-0.5.4-lp150.3.3.1.x86_64.rpm
pam_snapper-0.5.4-lp150.3.3.1.x86_64.rpm
pam_snapper-debuginfo-0.5.4-lp150.3.3.1.x86_64.rpm
snapper-0.5.4-lp150.3.3.1.src.rpm
snapper-0.5.4-lp150.3.3.1.x86_64.rpm
snapper-debuginfo-0.5.4-lp150.3.3.1.x86_64.rpm
snapper-debugsource-0.5.4-lp150.3.3.1.x86_64.rpm
snapper-zypp-plugin-0.5.4-lp150.3.3.1.noarch.rpm
libsnapper-devel-0.5.4-lp150.3.3.1.i586.rpm
libsnapper4-0.5.4-lp150.3.3.1.i586.rpm
libsnapper4-debuginfo-0.5.4-lp150.3.3.1.i586.rpm
pam_snapper-0.5.4-lp150.3.3.1.i586.rpm
pam_snapper-debuginfo-0.5.4-lp150.3.3.1.i586.rpm
snapper-0.5.4-lp150.3.3.1.i586.rpm
snapper-debuginfo-0.5.4-lp150.3.3.1.i586.rpm
snapper-debugsource-0.5.4-lp150.3.3.1.i586.rpm
openSUSE-2018-481
Recommended update for issue-generator
moderate
openSUSE Leap 15.0 Update
This update for issue-generator fixes the following issues:
- boo#1085196: the /etc/issue file was replaced and agetty reloaded
even if there were no changes
issue-generator-1.5-lp150.3.3.1.noarch.rpm
issue-generator-1.5-lp150.3.3.1.src.rpm
openSUSE-2018-480
Recommended update for SUSEConnect
moderate
openSUSE Leap 15.0 Update
This update for SUSEConnect fixes the following issues:
- boo#1093658: SUSEConnect did not specify all run-time dependencies of the rmt-client-setup script
The following enhancement is included:
- Do not automatically register ecommended products that are not mirrored by the registration proxy
SUSEConnect-0.3.11-lp150.2.3.1.src.rpm
SUSEConnect-0.3.11-lp150.2.3.1.x86_64.rpm
openSUSE-2018-574
Recommended update for yast2-bootloader
important
openSUSE Leap 15.0 Update
This update for yast2-bootloader fixes the following issues:
- boo#1092417: MD RAID Disks were not listed in Guided Setup some complex setups that also contain physical partitions
- boo#1043029: Propose fips boot parameter if it is used for installation on s390
- Avoid "Invalid partition table" on GPT disks by properly setting pmbr flag (boo#1093887)
yast2-bootloader-4.0.35-lp150.2.5.1.src.rpm
yast2-bootloader-4.0.35-lp150.2.5.1.x86_64.rpm
yast2-bootloader-4.0.35-lp150.2.5.1.i586.rpm
openSUSE-2018-497
Recommended update for gcompris-qt
low
openSUSE Leap 15.0 Update
This recommended update for gcompris-qt fixes the following issue (boo#1093988):
- text corrections and translation updates
- UI position and element interaction corrections
- fixes to audio in several activities
- corrections and improvements to multiple activities
gcompris-qt-voices was updated to match.
gcompris-qt-voices-0~20180517-lp150.2.4.1.noarch.rpm
gcompris-qt-voices-0~20180517-lp150.2.4.1.src.rpm
gcompris-qt-0.91-lp150.3.3.1.src.rpm
gcompris-qt-0.91-lp150.3.3.1.x86_64.rpm
gcompris-qt-activities-0.91-lp150.3.3.1.noarch.rpm
gcompris-qt-debuginfo-0.91-lp150.3.3.1.x86_64.rpm
gcompris-qt-debugsource-0.91-lp150.3.3.1.x86_64.rpm
gcompris-qt-lang-0.91-lp150.3.3.1.noarch.rpm
openSUSE-2018-502
Recommended update for yast2-country
moderate
openSUSE Leap 15.0 Update
This update for yast2-country fixes the following issues:
- yast2 firstboot failed to run on a system with empty /etc/locale.conf (boo#1092979)
yast2-country-4.0.22-lp150.2.3.1.src.rpm
yast2-country-4.0.22-lp150.2.3.1.x86_64.rpm
yast2-country-data-4.0.22-lp150.2.3.1.x86_64.rpm
yast2-country-4.0.22-lp150.2.3.1.i586.rpm
yast2-country-data-4.0.22-lp150.2.3.1.i586.rpm
openSUSE-2018-501
Recommended update for yast2-storage-ng
moderate
openSUSE Leap 15.0 Update
This update for yast2-storage-ng fixes the following issues:
- more detailed description about the origin of the partitioning layout (boo#1089274)
- issues detecting of candidate disks for installation (boo#1091047)
- On Power9, 'No Operating System found' may have been printed after first boot (boo#1090019)
- several translation issues (boo#1081837, boo#1081601)
The following work-arounds are included:
- To consider MD RAIDs as BIOS RAIDs the environment variable LIBSTORAGE_MDPART can be used (boo#1092417)
yast2-storage-ng-4.0.183-lp150.2.3.1.src.rpm
yast2-storage-ng-4.0.183-lp150.2.3.1.x86_64.rpm
yast2-storage-ng-4.0.183-lp150.2.3.1.i586.rpm
openSUSE-2018-503
Recommended update for sbd
moderate
openSUSE Leap 15.0 Update
This update for updates sbd fixes the following issues:
- SBD did not log some important messages (boo#1091839)
- sbd-md failed to return an error if it failed to list any devices (boo#1086650)
sbd-1.3.1+20180507.e102d9e-lp150.2.3.1.src.rpm
sbd-1.3.1+20180507.e102d9e-lp150.2.3.1.x86_64.rpm
sbd-debuginfo-1.3.1+20180507.e102d9e-lp150.2.3.1.x86_64.rpm
sbd-debugsource-1.3.1+20180507.e102d9e-lp150.2.3.1.x86_64.rpm
openSUSE-2018-504
Recommended update for yast2-packager
moderate
openSUSE Leap 15.0 Update
This update for yast2-packager fixes the following issues:
- The YaST2 Packager module could not be started from the programs menus (boo#1087352)
yast2-packager-4.0.62-lp150.2.3.1.src.rpm
yast2-packager-4.0.62-lp150.2.3.1.x86_64.rpm
yast2-packager-4.0.62-lp150.2.3.1.i586.rpm
openSUSE-2018-508
Recommended update for cloud-init
moderate
openSUSE Leap 15.0 Update
This update for cloud-init fixes the following issues:
- issues in cloud-init locating datasources (boo#1089824, boo#1093501)
cloud-init-18.2-lp150.2.3.1.src.rpm
cloud-init-18.2-lp150.2.3.1.x86_64.rpm
cloud-init-config-suse-18.2-lp150.2.3.1.x86_64.rpm
cloud-init-doc-18.2-lp150.2.3.1.x86_64.rpm
openSUSE-2018-524
Recommended update for libu2f-host, pam_u2f
moderate
openSUSE Leap 15.0 Update
This update for libu2f-host, pam_u2f fixes the following issues:
- Various bug fixes in libu2f 1.1.6, including added udev rules for more devices (boo#1094622)
- Various bug fixes in pam_u2f 1.0.7, including an issue when using syslog as a debug facility (boo#1094622)
libu2f-host-1.1.6-lp150.2.3.1.src.rpm
libu2f-host-debuginfo-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host-debugsource-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host-devel-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host-doc-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host0-1.1.6-lp150.2.3.1.x86_64.rpm
libu2f-host0-debuginfo-1.1.6-lp150.2.3.1.x86_64.rpm
u2f-host-1.1.6-lp150.2.3.1.x86_64.rpm
u2f-host-debuginfo-1.1.6-lp150.2.3.1.x86_64.rpm
pam_u2f-1.0.7-lp150.2.3.1.src.rpm
pam_u2f-1.0.7-lp150.2.3.1.x86_64.rpm
pam_u2f-debuginfo-1.0.7-lp150.2.3.1.x86_64.rpm
pam_u2f-debugsource-1.0.7-lp150.2.3.1.x86_64.rpm
openSUSE-2018-506
Recommended update for yast2-installation
moderate
openSUSE Leap 15.0 Update
This update for yast2-installation fixes the following issues:
- Attempts to set read-only property to default BTRFS subvolume failed if the filesystem already existed on disk (boo#1091047)
- Unmounting a filesystem may after installation/upgrade, log a warning (boo#1090018)
yast2-installation-4.0.60-lp150.2.3.1.noarch.rpm
yast2-installation-4.0.60-lp150.2.3.1.src.rpm
openSUSE-2018-525
Recommended update for python-kiwi
moderate
openSUSE Leap 15.0 Update
This updates python-kiwi to version 9.15.1 fixing the following issues:
* Fix zypper add lock operations
* Make container compression a configuration option
* Return file name after archive or compression call
* Allow docker root import from uncompressed file
* Add uninstall pacakges type
* Some simple code cleaning
dracut-kiwi-lib-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-live-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-oem-dump-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-oem-repart-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-overlay-9.15.2-lp150.2.3.1.x86_64.rpm
kiwi-man-pages-9.15.2-lp150.2.3.1.x86_64.rpm
kiwi-pxeboot-9.15.2-lp150.2.3.1.x86_64.rpm
kiwi-tools-9.15.2-lp150.2.3.1.x86_64.rpm
kiwi-tools-debuginfo-9.15.2-lp150.2.3.1.x86_64.rpm
python-kiwi-9.15.2-lp150.2.3.1.src.rpm
python-kiwi-debugsource-9.15.2-lp150.2.3.1.x86_64.rpm
python2-kiwi-9.15.2-lp150.2.3.1.x86_64.rpm
python3-kiwi-9.15.2-lp150.2.3.1.x86_64.rpm
dracut-kiwi-lib-9.15.2-lp150.2.3.1.i586.rpm
dracut-kiwi-live-9.15.2-lp150.2.3.1.i586.rpm
dracut-kiwi-oem-dump-9.15.2-lp150.2.3.1.i586.rpm
dracut-kiwi-oem-repart-9.15.2-lp150.2.3.1.i586.rpm
dracut-kiwi-overlay-9.15.2-lp150.2.3.1.i586.rpm
kiwi-man-pages-9.15.2-lp150.2.3.1.i586.rpm
kiwi-pxeboot-9.15.2-lp150.2.3.1.i586.rpm
kiwi-tools-9.15.2-lp150.2.3.1.i586.rpm
kiwi-tools-debuginfo-9.15.2-lp150.2.3.1.i586.rpm
python-kiwi-debugsource-9.15.2-lp150.2.3.1.i586.rpm
python2-kiwi-9.15.2-lp150.2.3.1.i586.rpm
python3-kiwi-9.15.2-lp150.2.3.1.i586.rpm
openSUSE-2018-507
Recommended update for yast2-pkg-bindings
moderate
openSUSE Leap 15.0 Update
This update for yast2-pkg-bindings fixes the following issue:
- Errors when refreshing the zypp-plugin-spacewalk service on a system not managed by spacewalk (boo#1086768)
yast2-pkg-bindings-devel-doc-4.0.10-lp150.2.3.1.noarch.rpm
yast2-pkg-bindings-devel-doc-4.0.10-lp150.2.3.1.src.rpm
yast2-pkg-bindings-4.0.10-lp150.2.3.1.src.rpm
yast2-pkg-bindings-4.0.10-lp150.2.3.1.x86_64.rpm
yast2-pkg-bindings-debuginfo-4.0.10-lp150.2.3.1.x86_64.rpm
yast2-pkg-bindings-debugsource-4.0.10-lp150.2.3.1.x86_64.rpm
yast2-pkg-bindings-4.0.10-lp150.2.3.1.i586.rpm
yast2-pkg-bindings-debuginfo-4.0.10-lp150.2.3.1.i586.rpm
yast2-pkg-bindings-debugsource-4.0.10-lp150.2.3.1.i586.rpm
openSUSE-2018-500
Recommended update for fence-agents
moderate
openSUSE Leap 15.0 Update
This update for fence-agents fixes the following issues:
- Fence_sbd failed to start, an issue related to Python 3 encoding (boo#1082871)
fence-agents-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.src.rpm
fence-agents-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm
fence-agents-debuginfo-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm
fence-agents-debugsource-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm
fence-agents-devel-4.0.25+git.1524215631.8f9c770a-lp150.2.3.1.x86_64.rpm
openSUSE-2018-505
Recommended update for patterns-base
moderate
openSUSE Leap 15.0 Update
This update for patterns-base fixes the following issues:
- x11 pattern corrections (boo#1086663)
- terminfo was missing from the minimal_base pattern (boo#1081747)
- bootloader variants were listed in patterns (boo#1064265)
patterns-base-20171206-lp150.15.3.1.src.rpm
patterns-base-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-apparmor-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-apparmor-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-apparmor_opt-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-base-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-base-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-basesystem-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-console-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-documentation-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-enhanced_base-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-enhanced_base-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-enhanced_base_opt-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-minimal_base-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-minimal_base-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-sw_management-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-sw_management-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-transactional_base-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-update_test-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11_enhanced-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11_enhanced-32bit-20171206-lp150.15.3.1.x86_64.rpm
patterns-base-x11_opt-20171206-lp150.15.3.1.x86_64.rpm
openSUSE-2018-526
Recommended update for google-compute-engine
moderate
openSUSE Leap 15.0 Update
This update brings google-compute-engine to version 20180510, fixing the following issues:
* Prevent delay in configuring IP forwarding routes.
* Include new google-network-daemon
* Add google-network-daemon.suse init script for SysV
* Stop shipping deprecated google-ip-forwarding-daemon service
* Install google_oslogin_nss_cache binary into oslogin package
* Include libnss cache as part of the OS Login package.
* Fix conflict with other applications that use curl and SSL.
google-compute-engine-20180510-lp150.2.3.1.src.rpm
google-compute-engine-init-20180510-lp150.2.3.1.noarch.rpm
google-compute-engine-oslogin-20180510-lp150.2.3.1.x86_64.rpm
google-compute-engine-oslogin-debuginfo-20180510-lp150.2.3.1.x86_64.rpm
google-compute-engine-oslogin-20180510-lp150.2.3.1.i586.rpm
google-compute-engine-oslogin-32bit-20180510-lp150.2.3.1.x86_64.rpm
google-compute-engine-oslogin-32bit-debuginfo-20180510-lp150.2.3.1.x86_64.rpm
google-compute-engine-oslogin-debuginfo-20180510-lp150.2.3.1.i586.rpm
openSUSE-2018-498
Recommended update for bind
moderate
openSUSE Leap 15.0 Update
This update for bind fixes the following issues:
- boo#1093338: bind-chrootenv contained some chroot related files in error
- boo#1092283: bind created /etc/rndc.key during installation instead of during first boot
bind-9.11.2-lp150.8.3.1.src.rpm
bind-9.11.2-lp150.8.3.1.x86_64.rpm
bind-chrootenv-9.11.2-lp150.8.3.1.x86_64.rpm
bind-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
bind-debugsource-9.11.2-lp150.8.3.1.x86_64.rpm
bind-devel-9.11.2-lp150.8.3.1.x86_64.rpm
bind-doc-9.11.2-lp150.8.3.1.noarch.rpm
bind-lwresd-9.11.2-lp150.8.3.1.x86_64.rpm
bind-lwresd-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
bind-utils-9.11.2-lp150.8.3.1.x86_64.rpm
bind-utils-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libbind9-160-9.11.2-lp150.8.3.1.x86_64.rpm
libbind9-160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libdns169-9.11.2-lp150.8.3.1.x86_64.rpm
libdns169-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libirs-devel-9.11.2-lp150.8.3.1.x86_64.rpm
libirs160-9.11.2-lp150.8.3.1.x86_64.rpm
libirs160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisc166-9.11.2-lp150.8.3.1.x86_64.rpm
libisc166-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisccc160-9.11.2-lp150.8.3.1.x86_64.rpm
libisccc160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisccfg160-9.11.2-lp150.8.3.1.x86_64.rpm
libisccfg160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
liblwres160-9.11.2-lp150.8.3.1.x86_64.rpm
liblwres160-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
python3-bind-9.11.2-lp150.8.3.1.noarch.rpm
bind-9.11.2-lp150.8.3.1.i586.rpm
bind-chrootenv-9.11.2-lp150.8.3.1.i586.rpm
bind-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
bind-debugsource-9.11.2-lp150.8.3.1.i586.rpm
bind-devel-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
bind-devel-9.11.2-lp150.8.3.1.i586.rpm
bind-lwresd-9.11.2-lp150.8.3.1.i586.rpm
bind-lwresd-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
bind-utils-9.11.2-lp150.8.3.1.i586.rpm
bind-utils-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libbind9-160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libbind9-160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libbind9-160-9.11.2-lp150.8.3.1.i586.rpm
libbind9-160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libdns169-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libdns169-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libdns169-9.11.2-lp150.8.3.1.i586.rpm
libdns169-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libirs-devel-9.11.2-lp150.8.3.1.i586.rpm
libirs160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libirs160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libirs160-9.11.2-lp150.8.3.1.i586.rpm
libirs160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libisc166-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libisc166-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisc166-9.11.2-lp150.8.3.1.i586.rpm
libisc166-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libisccc160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libisccc160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisccc160-9.11.2-lp150.8.3.1.i586.rpm
libisccc160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
libisccfg160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
libisccfg160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
libisccfg160-9.11.2-lp150.8.3.1.i586.rpm
libisccfg160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
liblwres160-32bit-9.11.2-lp150.8.3.1.x86_64.rpm
liblwres160-32bit-debuginfo-9.11.2-lp150.8.3.1.x86_64.rpm
liblwres160-9.11.2-lp150.8.3.1.i586.rpm
liblwres160-debuginfo-9.11.2-lp150.8.3.1.i586.rpm
openSUSE-2018-527
Recommended update for openmpi2
low
openSUSE Leap 15.0 Update
This update for openmpi2 fixes the following issues:
- boo#1092257: Support for QLogic Corp. FastLinQ QL41000 was missing
libopenmpi2-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm
libopenmpi_2_1_3-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm
libopenmpi_2_1_3-gnu-hpc-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-gnu-hpc-devel-2.1.3-lp150.3.3.1.noarch.rpm
openmpi2-gnu-hpc-devel-static-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-gnu-hpc-docs-2.1.3-lp150.3.3.1.noarch.rpm
openmpi2-gnu-hpc-macros-devel-2.1.3-lp150.3.3.1.noarch.rpm
openmpi_2_1_3-gnu-hpc-2.1.3-lp150.3.3.1.src.rpm
openmpi_2_1_3-gnu-hpc-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-debugsource-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-devel-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-devel-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-devel-static-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-docs-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-macros-devel-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi_2_1_3-gnu-hpc-testsuite-2.1.3-lp150.3.3.1.noarch.rpm
openmpi_2_1_3-gnu-hpc-testsuite-2.1.3-lp150.3.3.1.src.rpm
openmpi2-2.1.3-lp150.3.3.1.src.rpm
openmpi2-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-config-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-debugsource-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-devel-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-devel-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-docs-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-libs-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-libs-debuginfo-2.1.3-lp150.3.3.1.x86_64.rpm
openmpi2-testsuite-2.1.3-lp150.3.3.1.noarch.rpm
openmpi2-testsuite-2.1.3-lp150.3.3.1.src.rpm
openSUSE-2018-499
Recommended update for patterns-lxqt
moderate
openSUSE Leap 15.0 Update
This update for patterns-lxqt fixes the following issues:
- The LXQt pattern unnecessarily required some XFCE packages (boo#1094025)
patterns-lxqt-20170319-lp150.2.3.1.src.rpm
patterns-lxqt-lxqt-20170319-lp150.2.3.1.x86_64.rpm
openSUSE-2018-528
Recommended update for virtualbox
moderate
openSUSE Leap 15.0 Update
This recommended to virtualbox to version 5.2.12 (boo#1094158) resolves the following issues:
- Serial: fixed possible data corruption when sending data under certain circumstances
- Video recording: fixed starting / stopping recording under certain circumstances
- Linux guests: support Linux 4.16 and EL 7.5 kernels
- Linux guests: 3D fixes for recent guests
The following tracked build fix is included:
- boo#1093731: Fix build errors with Qt 5.11
python2-virtualbox-5.2.12-lp150.4.3.1.x86_64.rpm
python2-virtualbox-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-5.2.12-lp150.4.3.1.src.rpm
virtualbox-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-debugsource-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-devel-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-guest-desktop-icons-5.2.12-lp150.4.3.1.noarch.rpm
virtualbox-guest-kmp-default-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm
virtualbox-guest-kmp-default-debuginfo-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm
virtualbox-guest-source-5.2.12-lp150.4.3.1.noarch.rpm
virtualbox-guest-tools-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-guest-tools-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-guest-x11-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-guest-x11-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-host-kmp-default-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm
virtualbox-host-kmp-default-debuginfo-5.2.12_k4.12.14_lp150.11-lp150.4.3.1.x86_64.rpm
virtualbox-host-source-5.2.12-lp150.4.3.1.noarch.rpm
virtualbox-qt-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-qt-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-vnc-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-websrv-5.2.12-lp150.4.3.1.x86_64.rpm
virtualbox-websrv-debuginfo-5.2.12-lp150.4.3.1.x86_64.rpm
openSUSE-2018-495
Security update for enigmail
moderate
openSUSE Leap 15.0 Update
This update for enigmail to version 2.0.5 fixes the following issues:
Improvements on previous fixes on CVE-2017-17688, boo#1093151 and CVE-2017-17689, boo#1093152 (EFAIL):
- do not decrypt MIME parts unnecessarily
- improve Error Message for Missing Message Modification Code
enigmail-2.0.5-lp150.2.6.1.src.rpm
enigmail-2.0.5-lp150.2.6.1.x86_64.rpm
openSUSE-2018-535
Security update for enigmail
moderate
openSUSE Leap 15.0 Update
This update for enigmail to version 2.0.6 fixes the following issues:
Security issues fixed:
- Replies to a partially encrypted message may have revealed protected information:
no longer display PGP/MIME message part followed by unencrypted data (boo#1094781)
- Signature could be spoofed via Inline-PGP in HTML Mails
The following bugs were fixed:
- Filter actions could forget selected mail folder names
enigmail-2.0.6-lp150.2.9.1.src.rpm
enigmail-2.0.6-lp150.2.9.1.x86_64.rpm
openSUSE-2018-518
Recommended update for GraphicsMagick
moderate
openSUSE Leap 15.0 Update
GraphicsMagick was updated to 1.3.29:
* Security Fixes:
- GraphicsMagick is now participating in Google's oss-fuzz project
- JNG: Require that the embedded JPEG image have the same dimensions
as the JNG image as provided by JHDR. Avoids a heap write overflow.
- MNG: Arbitrarily limit the number of loops which may be requested by
the MNG LOOP chunk to 512 loops, and provide the '-define
mng:maximum-loops=value' option in case the user wants to change the
limit. This fixes a denial of service caused by large LOOP
specifications.
* Bug fixes:
- DICOM: Pre/post rescale functions are temporarily disabled (until
the implementation is fixed).
- JPEG: Fix regression in last release in which reading some JPEG
files produces the error "Improper call to JPEG library in state
201".
- ICON: Some DIB-based Windows ICON files were reported as corrupt to
an unexpectedly missing opacity mask image.
- In-memory Blob I/O: Don't implicitly increase the allocation size
due to seek offsets.
- MNG: Detect and handle failure to allocate global PLTE. Fix divide
by zero.
- DrawGetStrokeDashArray(): Check for failure to allocate memory.
- BlobToImage(): Now produces useful exception reports to cover the
cases where 'magick' was not set and the file format could not be
deduced from its header.
* API Updates:
- Wand API: Added MagickIsPaletteImage(), MagickIsOpaqueImage(),
MagickIsMonochromeImage(), MagickIsGrayImage(), MagickHasColormap()
based on contributions by Troy Patteson.
- New structure ImageExtra added and Image 'clip_mask' member is
replaced by 'extra' which points to private ImageExtra allocation.
The ImageGetClipMask() function now provides access to the clip mask
image.
- New structure DrawInfoExtra and DrawInfo 'clip_path' is replaced by
'extra' which points to private DrawInfoExtra allocation. The
DrawInfoGetClipPath() function now provides access to the clip path.
- New core library functions: GetImageCompositeMask(),
CompositeMaskImage(), CompositePathImage(), SetImageCompositeMask(),
ImageGetClipMask(), ImageGetCompositeMask(), DrawInfoGetClipPath(),
DrawInfoGetCompositePath()
- Deprecated core library functions: RegisterStaticModules(),
UnregisterStaticModules().
* Feature improvements:
- Static modules (in static library or shared library without
dynamically loadable modules) are now lazy-loaded using the same
external interface as the lazy-loader for dynamic modules. This
results in more similarity between the builds and reduces the fixed
initialization overhead by only initializing the modules which are
used.
- SVG: The quality of SVG support has been significantly improved due
to the efforts of Greg Wolfe.
- FreeType/TTF rendering: Rendering fixes for opacity.
GraphicsMagick-1.3.29-lp150.3.3.1.src.rpm
GraphicsMagick-1.3.29-lp150.3.3.1.x86_64.rpm
GraphicsMagick-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
GraphicsMagick-debugsource-1.3.29-lp150.3.3.1.x86_64.rpm
GraphicsMagick-devel-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick++-Q16-12-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick++-Q16-12-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick++-devel-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick-Q16-3-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick-Q16-3-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagick3-config-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagickWand-Q16-2-1.3.29-lp150.3.3.1.x86_64.rpm
libGraphicsMagickWand-Q16-2-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
perl-GraphicsMagick-1.3.29-lp150.3.3.1.x86_64.rpm
perl-GraphicsMagick-debuginfo-1.3.29-lp150.3.3.1.x86_64.rpm
openSUSE-2018-515
Security update for the Linux Kernel
important
openSUSE Leap 15.0 Update
The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3639: Systems with microprocessors utilizing speculative
execution and speculative execution of memory reads before the addresses
of all prior memory writes are known may allow unauthorized disclosure
of information to an attacker with local user access via a side-channel
analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1087082).
A new boot commandline option was introduced,
"spec_store_bypass_disable", which can have following values:
- auto: Kernel detects whether your CPU model contains an implementation
of Speculative Store Bypass and picks the most appropriate mitigation.
- on: disable Speculative Store Bypass
- off: enable Speculative Store Bypass
- prctl: Control Speculative Store Bypass per thread via
prctl. Speculative Store Bypass is enabled for a process by default. The
state of the control is inherited on fork.
- seccomp: Same as "prctl" above, but all seccomp threads will disable
SSB unless they explicitly opt out.
The default is "seccomp", meaning programs need explicit opt-in into the mitigation.
Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:
- "Vulnerable"
- "Mitigation: Speculative Store Bypass disabled"
- "Mitigation: Speculative Store Bypass disabled via prctl"
- "Mitigation: Speculative Store Bypass disabled via prctl and seccomp"
The following non-security bugs were fixed:
- allow_unsupported: add module tainting on feature use (FATE#323394).
- powerpc/64/kexec: fix race in kexec when XIVE is shutdown (bsc#1088273).
- reiserfs: mark read-write mode unsupported (FATE#323394).
- reiserfs: package in separate KMP (FATE#323394).
kernel-debug-4.12.14-lp150.12.4.1.nosrc.rpm
True
kernel-debug-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-base-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-base-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-devel-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-debug-devel-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-4.12.14-lp150.12.4.1.nosrc.rpm
True
kernel-default-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-base-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-base-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-devel-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-default-devel-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-docs-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-docs-4.12.14-lp150.12.4.1.nosrc.rpm
True
kernel-docs-html-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-kvmsmall-4.12.14-lp150.12.4.1.nosrc.rpm
True
kernel-kvmsmall-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-base-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-devel-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-obs-build-4.12.14-lp150.12.4.1.src.rpm
True
kernel-obs-build-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-obs-build-debugsource-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-obs-qa-4.12.14-lp150.12.4.1.src.rpm
True
kernel-obs-qa-4.12.14-lp150.12.4.1.x86_64.rpm
True
kernel-devel-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-macros-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-source-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-source-4.12.14-lp150.12.4.1.src.rpm
True
kernel-source-vanilla-4.12.14-lp150.12.4.1.noarch.rpm
True
kernel-syms-4.12.14-lp150.12.4.1.src.rpm
True
kernel-syms-4.12.14-lp150.12.4.1.x86_64.rpm
True
openSUSE-2018-520
Security update for wireshark
moderate
openSUSE Leap 15.0 Update
This update for wireshark fixes the following issues:
Minor vulnerabilities that could be used to trigger dissector crashes or
cause excessive memory use by making Wireshark read specially crafted
packages from the network or capture files (boo#1094301):
- CVE-2018-11356: DNS dissector crash
- CVE-2018-11357: Multiple dissectors could consume excessive memory
- CVE-2018-11358: Q.931 dissector crash
- CVE-2018-11359: The RRC dissector and other dissectors could crash
- CVE-2018-11360: GSM A DTAP dissector crash
- CVE-2018-11362: LDSS dissector crash
This update to version 2.4.7 also contains bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-2.4.7.html
libwireshark9-2.4.7-lp150.2.3.1.x86_64.rpm
libwireshark9-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
libwiretap7-2.4.7-lp150.2.3.1.x86_64.rpm
libwiretap7-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
libwscodecs1-2.4.7-lp150.2.3.1.x86_64.rpm
libwscodecs1-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
libwsutil8-2.4.7-lp150.2.3.1.x86_64.rpm
libwsutil8-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-2.4.7-lp150.2.3.1.src.rpm
wireshark-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-debugsource-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-devel-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-ui-qt-2.4.7-lp150.2.3.1.x86_64.rpm
wireshark-ui-qt-debuginfo-2.4.7-lp150.2.3.1.x86_64.rpm
openSUSE-2018-521
Recommended update for gajim, python-nbxmpp
low
openSUSE Leap 15.0 Update
This update for gajim and python-nbxmpp fixes the following issues:
- gajim plugin installer did not work correctly due to being unable to locate required certificates (boo#1094343)
- python-nbxmpp did not have the correct, dependent version, causes gajium crashes on start-up (boo#1093009)
gajim-1.0.3-lp150.3.3.1.noarch.rpm
gajim-1.0.3-lp150.3.3.1.src.rpm
gajim-lang-1.0.3-lp150.3.3.1.noarch.rpm
python-nbxmpp-0.6.6-lp150.2.3.1.src.rpm
python2-nbxmpp-0.6.6-lp150.2.3.1.noarch.rpm
python2-nbxmpp-doc-0.6.6-lp150.2.3.1.noarch.rpm
python3-nbxmpp-0.6.6-lp150.2.3.1.noarch.rpm
python3-nbxmpp-doc-0.6.6-lp150.2.3.1.noarch.rpm
openSUSE-2018-545
Optional update for firewalld
low
openSUSE Leap 15.0 Update
This update for firewalld fixes the following issues:
- minor translation updates and typo fixes (boo#1094051)
firewall-applet-0.5.3-lp150.2.3.1.noarch.rpm
firewall-config-0.5.3-lp150.2.3.1.noarch.rpm
firewall-macros-0.5.3-lp150.2.3.1.noarch.rpm
firewalld-0.5.3-lp150.2.3.1.noarch.rpm
firewalld-0.5.3-lp150.2.3.1.src.rpm
firewalld-lang-0.5.3-lp150.2.3.1.noarch.rpm
python3-firewall-0.5.3-lp150.2.3.1.noarch.rpm
openSUSE-2018-532
Security update for pdns
moderate
openSUSE Leap 15.0 Update
This update for pdns fixes the following issues:
Security issues fixed:
- CVE-2018-1046: Fix an issue with replaying a specially crafted PCAP file that can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution (bsc#1092540).
pdns-4.1.2-lp150.3.3.1.src.rpm
pdns-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-geoip-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-geoip-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-godbc-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-godbc-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-ldap-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-ldap-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-lua-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-lua-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-mydns-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-mydns-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-mysql-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-mysql-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-postgresql-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-postgresql-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-remote-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-remote-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-sqlite3-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-backend-sqlite3-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-debuginfo-4.1.2-lp150.3.3.1.x86_64.rpm
pdns-debugsource-4.1.2-lp150.3.3.1.x86_64.rpm
openSUSE-2018-536
Recommended update for live-net-installer
moderate
openSUSE Leap 15.0 Update
This update for live-net-installer fixes the following issues:
- Fixes installation from GNOME live media (boo#1094842)
live-net-installer-1.0-lp150.3.3.1.noarch.rpm
live-net-installer-1.0-lp150.3.3.1.src.rpm
openSUSE-2018-537
Recommended update for fate
moderate
openSUSE Leap 15.0 Update
This update for fate fixes the following issues:
- New or imported features are sometimes not shown/editable (bsc#1094520)
- explicitely select feature if it is the first one (bsc#1081921)
- various ECO related improvements (bsc#1080586)
- Prefs could have invalid Products (bsc#1088478)
fate-1.6.0.5-lp150.2.3.1.src.rpm
fate-1.6.0.5-lp150.2.3.1.x86_64.rpm
fate-debuginfo-1.6.0.5-lp150.2.3.1.x86_64.rpm
openSUSE-2018-554
Optional update for geotiff
moderate
openSUSE Leap 15.0 Update
This update for geotiff fixes the following issues:
- Incorrect path for library in .pc file of devel subpackage (boo#1094802)
geotiff-1.4.2-lp150.2.3.1.src.rpm
geotiff-1.4.2-lp150.2.3.1.x86_64.rpm
geotiff-debuginfo-1.4.2-lp150.2.3.1.x86_64.rpm
geotiff-debugsource-1.4.2-lp150.2.3.1.x86_64.rpm
geotiff-devel-1.4.2-lp150.2.3.1.x86_64.rpm
libgeotiff2-1.4.2-lp150.2.3.1.x86_64.rpm
libgeotiff2-debuginfo-1.4.2-lp150.2.3.1.x86_64.rpm
openSUSE-2018-566
Recommended update for shim
low
openSUSE Leap 15.0 Update
This update for shim fixes the following issues:
- Show a countdown menu before reset. (bsc#1092000)
shim-14-lp150.8.5.1.src.rpm
shim-14-lp150.8.5.1.x86_64.rpm
shim-debuginfo-14-lp150.8.5.1.x86_64.rpm
shim-debugsource-14-lp150.8.5.1.x86_64.rpm
openSUSE-2018-555
Recommended update for syncthing
moderate
openSUSE Leap 15.0 Update
This update for syncthing fixes the following issue:
- Syncthing attempted to update itself, which is not in line with distribution policy (boo#1095169)
syncthing-0.14.46-lp150.3.3.1.src.rpm
syncthing-0.14.46-lp150.3.3.1.x86_64.rpm
openSUSE-2018-556
Recommended update for xfce4-branding-openSUSE
low
openSUSE Leap 15.0 Update
This update for xfce4-branding-openSUSE fixes the following issues:
- XFCE branding was incorrect (boo#1095192)
exo-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
libgarcon-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
libxfce4ui-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
midori-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
openSUSE-xfce-icon-theme-4.12.0-lp150.5.3.1.noarch.rpm
thunar-volman-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-branding-openSUSE-4.12.0-lp150.5.3.1.src.rpm
xfce4-notifyd-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-panel-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-power-manager-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-session-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfce4-settings-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfdesktop-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
xfwm4-branding-openSUSE-4.12.0-lp150.5.3.1.noarch.rpm
openSUSE-2018-557
Security update for git
important
openSUSE Leap 15.0 Update
This update for fixes the following security issues:
* path sanity-checks on NTFS can read arbitrary memory (CVE-2018-11233,
boo#1095218)
* arbitrary code execution when recursively cloning a malicious repository
(CVE-2018-11235, boo#1095219)
git-2.16.4-lp150.2.3.1.src.rpm
git-2.16.4-lp150.2.3.1.x86_64.rpm
git-arch-2.16.4-lp150.2.3.1.x86_64.rpm
git-core-2.16.4-lp150.2.3.1.x86_64.rpm
git-core-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-credential-gnome-keyring-2.16.4-lp150.2.3.1.x86_64.rpm
git-credential-gnome-keyring-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-credential-libsecret-2.16.4-lp150.2.3.1.x86_64.rpm
git-credential-libsecret-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-cvs-2.16.4-lp150.2.3.1.x86_64.rpm
git-daemon-2.16.4-lp150.2.3.1.x86_64.rpm
git-daemon-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-debugsource-2.16.4-lp150.2.3.1.x86_64.rpm
git-doc-2.16.4-lp150.2.3.1.noarch.rpm
git-email-2.16.4-lp150.2.3.1.x86_64.rpm
git-gui-2.16.4-lp150.2.3.1.x86_64.rpm
git-p4-2.16.4-lp150.2.3.1.x86_64.rpm
git-svn-2.16.4-lp150.2.3.1.x86_64.rpm
git-svn-debuginfo-2.16.4-lp150.2.3.1.x86_64.rpm
git-web-2.16.4-lp150.2.3.1.x86_64.rpm
gitk-2.16.4-lp150.2.3.1.x86_64.rpm
git-2.16.4-lp150.2.3.1.i586.rpm
git-arch-2.16.4-lp150.2.3.1.i586.rpm
git-core-2.16.4-lp150.2.3.1.i586.rpm
git-core-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-credential-gnome-keyring-2.16.4-lp150.2.3.1.i586.rpm
git-credential-gnome-keyring-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-credential-libsecret-2.16.4-lp150.2.3.1.i586.rpm
git-credential-libsecret-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-cvs-2.16.4-lp150.2.3.1.i586.rpm
git-daemon-2.16.4-lp150.2.3.1.i586.rpm
git-daemon-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-debugsource-2.16.4-lp150.2.3.1.i586.rpm
git-email-2.16.4-lp150.2.3.1.i586.rpm
git-gui-2.16.4-lp150.2.3.1.i586.rpm
git-p4-2.16.4-lp150.2.3.1.i586.rpm
git-svn-2.16.4-lp150.2.3.1.i586.rpm
git-svn-debuginfo-2.16.4-lp150.2.3.1.i586.rpm
git-web-2.16.4-lp150.2.3.1.i586.rpm
gitk-2.16.4-lp150.2.3.1.i586.rpm
openSUSE-2018-548
Recommended update for kglobalaccel
moderate
openSUSE Leap 15.0 Update
This update for kglobalaccel fixes the following issues:
- Task switcher was randomly ignored, the user had to pres ALT-TAB several times
to activate it (kde#394689, boo#1094931)
kglobalaccel-5.45.0-lp150.2.3.1.src.rpm
kglobalaccel-debugsource-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel-devel-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel5-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel5-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-lang-5.45.0-lp150.2.3.1.noarch.rpm
libKF5GlobalAccelPrivate5-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccelPrivate5-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel-debugsource-5.45.0-lp150.2.3.1.i586.rpm
kglobalaccel-devel-32bit-5.45.0-lp150.2.3.1.x86_64.rpm
kglobalaccel-devel-5.45.0-lp150.2.3.1.i586.rpm
kglobalaccel5-5.45.0-lp150.2.3.1.i586.rpm
kglobalaccel5-debuginfo-5.45.0-lp150.2.3.1.i586.rpm
libKF5GlobalAccel5-32bit-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-32bit-debuginfo-5.45.0-lp150.2.3.1.x86_64.rpm
libKF5GlobalAccel5-5.45.0-lp150.2.3.1.i586.rpm
libKF5GlobalAccel5-debuginfo-5.45.0-lp150.2.3.1.i586.rpm
libKF5GlobalAccelPrivate5-5.45.0-lp150.2.3.1.i586.rpm
libKF5GlobalAccelPrivate5-debuginfo-5.45.0-lp150.2.3.1.i586.rpm
openSUSE-2018-561
Recommended update for plasma5-pk-updates
low
openSUSE Leap 15.0 Update
This update for plasma5-pk-updates fixes the following issues:
- boo#1093743: Some Italian translations were missing
plasma5-pk-updates-0.3.2-lp150.9.3.1.src.rpm
plasma5-pk-updates-0.3.2-lp150.9.3.1.x86_64.rpm
plasma5-pk-updates-debuginfo-0.3.2-lp150.9.3.1.x86_64.rpm
plasma5-pk-updates-debugsource-0.3.2-lp150.9.3.1.x86_64.rpm
plasma5-pk-updates-lang-0.3.2-lp150.9.3.1.noarch.rpm
openSUSE-2018-596
Security update for prosody
moderate
openSUSE Leap 15.0 Update
This update for prosody to version 0.10.2 fixes the following issues:
This security issue was fixed:
- CVE-2018-10847: Prevent insufficient validation of client-provided parameters
during XMPP stream restarts. Authenticated users may have overriden the realm
associated with their session, potentially bypassing security policies and
allowing impersonation (bsc#1094890).
These non-security issues were fixed:
- mod_websocket: Store the request object on the session for use by other modules
- mod_c2s: Avoid concatenating potential nil value
- core.certmanager: Allow all non-whitespace in service name
- mod_disco: Skip code specific to disco on user accounts
- mod_bosh: Store the normalized hostname on session
- MUC: Fix error logged when no persistent rooms present
prosody-0.10.2-lp150.3.6.2.src.rpm
prosody-0.10.2-lp150.3.6.2.x86_64.rpm
prosody-debuginfo-0.10.2-lp150.3.6.2.x86_64.rpm
prosody-debugsource-0.10.2-lp150.3.6.2.x86_64.rpm
openSUSE-2018-562
Recommended update for syslog-ng
moderate
openSUSE Leap 15.0 Update
This update for syslog-ng fixes the following issue:
- syslog-ng did not start when network was not yet running during boot (boo#1077975)
libevtlog-3_14-0-3.14.1-lp150.2.3.1.x86_64.rpm
libevtlog-3_14-0-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-3.14.1-lp150.2.3.1.src.rpm
syslog-ng-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-curl-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-curl-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-debugsource-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-devel-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-geoip-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-geoip-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-python-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-python-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-redis-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-redis-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-smtp-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-smtp-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-sql-3.14.1-lp150.2.3.1.x86_64.rpm
syslog-ng-sql-debuginfo-3.14.1-lp150.2.3.1.x86_64.rpm
openSUSE-2018-563
Recommended update for blender
low
openSUSE Leap 15.0 Update
This update for blender fixes the following issues:
- Missing cycles headers causing broken GPU rendering with i.e CUDA (boo#1094777)
blender-2.79b-lp150.2.3.1.src.rpm
blender-2.79b-lp150.2.3.1.x86_64.rpm
blender-debuginfo-2.79b-lp150.2.3.1.x86_64.rpm
blender-debugsource-2.79b-lp150.2.3.1.x86_64.rpm
blender-devel-2.79b-lp150.2.3.1.noarch.rpm
blender-lang-2.79b-lp150.2.3.1.noarch.rpm
openSUSE-2018-565
Recommended update for fvwm2
low
openSUSE Leap 15.0 Update
This update for fvwm2 fixes the following issues:
Use update-alternatives for desktop selection (boo#1080494)
fvwm2-2.6.7-lp150.2.3.1.src.rpm
fvwm2-2.6.7-lp150.2.3.1.x86_64.rpm
fvwm2-debuginfo-2.6.7-lp150.2.3.1.x86_64.rpm
fvwm2-debugsource-2.6.7-lp150.2.3.1.x86_64.rpm
openSUSE-2018-599
Security update for xen
important
openSUSE Leap 15.0 Update
This update for xen to version 4.10.1 fixes several issues (bsc#1027519).
These security issues were fixed:
- CVE-2018-3639: Prevent attackers with local user access from extracting
information via a side-channel analysis, aka Speculative Store Bypass (SSB),
Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations
(bsc#1074562).
This non-security issue was fixed:
- Always call qemus xen-save-devices-state in suspend/resume to
fix migration with qcow2 images (bsc#1079730)
xen-4.10.1_04-lp150.2.3.1.src.rpm
xen-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-debugsource-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-devel-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-doc-html-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-libs-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-libs-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-tools-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-tools-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-tools-domU-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-tools-domU-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-debugsource-4.10.1_04-lp150.2.3.1.i586.rpm
xen-devel-4.10.1_04-lp150.2.3.1.i586.rpm
xen-libs-32bit-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-libs-32bit-debuginfo-4.10.1_04-lp150.2.3.1.x86_64.rpm
xen-libs-4.10.1_04-lp150.2.3.1.i586.rpm
xen-libs-debuginfo-4.10.1_04-lp150.2.3.1.i586.rpm
xen-tools-domU-4.10.1_04-lp150.2.3.1.i586.rpm
xen-tools-domU-debuginfo-4.10.1_04-lp150.2.3.1.i586.rpm
openSUSE-2018-598
Security update for ImageMagick
moderate
openSUSE Leap 15.0 Update
This update for ImageMagick to version 7.0.7-34 fixes the following issues:
The following security issue was fixed:
- Fixed numerous use of uninitialized values, integer overflow, memory exceeded, and timeouts.
The following non-security issues were fixed:
- Added support for reading eXIf chunks to the PNG coder.
- Improved clip / composite mask handling.
- Restore SetImageAlpha() behavior.
- Fix -clip and -mask options.
- Missing break when checking "compliance" element.
ImageMagick-7.0.7.34-lp150.2.3.1.src.rpm
ImageMagick-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-debugsource-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-devel-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-doc-7.0.7.34-lp150.2.3.1.noarch.rpm
ImageMagick-extra-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-extra-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-7_Q16HDRI4-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-devel-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickCore-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickWand-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
perl-PerlMagick-7.0.7.34-lp150.2.3.1.x86_64.rpm
perl-PerlMagick-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-debugsource-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-devel-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
ImageMagick-devel-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-extra-7.0.7.34-lp150.2.3.1.i586.rpm
ImageMagick-extra-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
libMagick++-7_Q16HDRI4-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-7_Q16HDRI4-32bit-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-7_Q16HDRI4-7.0.7.34-lp150.2.3.1.i586.rpm
libMagick++-7_Q16HDRI4-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
libMagick++-devel-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagick++-devel-7.0.7.34-lp150.2.3.1.i586.rpm
libMagickCore-7_Q16HDRI6-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickCore-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickCore-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.i586.rpm
libMagickCore-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
libMagickWand-7_Q16HDRI6-32bit-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickWand-7_Q16HDRI6-32bit-debuginfo-7.0.7.34-lp150.2.3.1.x86_64.rpm
libMagickWand-7_Q16HDRI6-7.0.7.34-lp150.2.3.1.i586.rpm
libMagickWand-7_Q16HDRI6-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
perl-PerlMagick-7.0.7.34-lp150.2.3.1.i586.rpm
perl-PerlMagick-debuginfo-7.0.7.34-lp150.2.3.1.i586.rpm
openSUSE-2018-573
Security update for xdg-utils
important
openSUSE Leap 15.0 Update
This update for xdg-utils fixes this security issues:
- CVE-2017-18266: The open_envvar function in xdg-open did not validate strings
launching the program specified by the BROWSER environment variable, which
might allowed remote attackers to conduct argument-injection attacks via a
crafted URL (bsc#1093086).
xdg-utils-20170508-lp150.3.3.2.noarch.rpm
xdg-utils-20170508-lp150.3.3.2.src.rpm
openSUSE-2018-576
Recommended update for tar
moderate
openSUSE Leap 15.0 Update
This update for tar to version 1.30 fixes the following issues:
- Report erroneous use of position-sensitive options.
- --numeric-owner now affects private headers too.
- Fixed the --delay-directory-restore option
- The --warnings=none option now suppresses all warnings
- Fixed reporting of hardlink mismatches during compare
This update also replaces a previously patched security fix with the full upstream version:
- Member names containing '..' components are now skipped when extracting
tar-1.30-lp150.2.3.2.src.rpm
tar-1.30-lp150.2.3.2.x86_64.rpm
tar-backup-scripts-1.30-lp150.2.3.2.noarch.rpm
tar-debuginfo-1.30-lp150.2.3.2.x86_64.rpm
tar-debugsource-1.30-lp150.2.3.2.x86_64.rpm
tar-doc-1.30-lp150.2.3.2.noarch.rpm
tar-lang-1.30-lp150.2.3.2.noarch.rpm
tar-rmt-1.30-lp150.2.3.2.x86_64.rpm
tar-rmt-debuginfo-1.30-lp150.2.3.2.x86_64.rpm
tar-tests-1.30-lp150.2.3.2.x86_64.rpm
tar-tests-debuginfo-1.30-lp150.2.3.2.x86_64.rpm
tar-1.30-lp150.2.3.2.i586.rpm
tar-debuginfo-1.30-lp150.2.3.2.i586.rpm
tar-debugsource-1.30-lp150.2.3.2.i586.rpm
tar-rmt-1.30-lp150.2.3.2.i586.rpm
tar-rmt-debuginfo-1.30-lp150.2.3.2.i586.rpm
tar-tests-1.30-lp150.2.3.2.i586.rpm
tar-tests-debuginfo-1.30-lp150.2.3.2.i586.rpm
openSUSE-2018-600
Security update for glibc
moderate
openSUSE Leap 15.0 Update
This update for glibc fixes the following issues:
This security issue was fixed:
- Fixed an buffer overwrite issue in memcpy for Knights Landing CPUs
(boo#1092877, CVE-2018-11237)
glibc-2.26-lp150.11.3.2.src.rpm
glibc-2.26-lp150.11.3.2.x86_64.rpm
glibc-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-debugsource-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-static-2.26-lp150.11.3.2.x86_64.rpm
glibc-extra-2.26-lp150.11.3.2.x86_64.rpm
glibc-extra-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-html-2.26-lp150.11.3.2.noarch.rpm
glibc-i18ndata-2.26-lp150.11.3.2.noarch.rpm
glibc-info-2.26-lp150.11.3.2.noarch.rpm
glibc-locale-2.26-lp150.11.3.2.x86_64.rpm
glibc-locale-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-profile-2.26-lp150.11.3.2.x86_64.rpm
nscd-2.26-lp150.11.3.2.x86_64.rpm
nscd-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-testsuite-src-2.26-lp150.11.3.2.nosrc.rpm
glibc-utils-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-src-2.26-lp150.11.3.2.nosrc.rpm
glibc-utils-src-debugsource-2.26-lp150.11.3.2.x86_64.rpm
glibc-2.26-lp150.11.3.2.i586.rpm
glibc-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-debugsource-2.26-lp150.11.3.2.i586.rpm
glibc-devel-2.26-lp150.11.3.2.i586.rpm
glibc-devel-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-devel-static-2.26-lp150.11.3.2.i586.rpm
glibc-extra-2.26-lp150.11.3.2.i586.rpm
glibc-extra-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-locale-2.26-lp150.11.3.2.i586.rpm
glibc-locale-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-profile-2.26-lp150.11.3.2.i586.rpm
nscd-2.26-lp150.11.3.2.i586.rpm
nscd-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-2.26-lp150.11.3.2.i686.rpm
glibc-2.26-lp150.11.3.2.nosrc.rpm
glibc-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-debuginfo-2.26-lp150.11.3.2.i686.rpm
glibc-debugsource-2.26-lp150.11.3.2.i686.rpm
glibc-devel-2.26-lp150.11.3.2.i686.rpm
glibc-devel-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-devel-debuginfo-2.26-lp150.11.3.2.i686.rpm
glibc-devel-static-2.26-lp150.11.3.2.i686.rpm
glibc-devel-static-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-locale-2.26-lp150.11.3.2.i686.rpm
glibc-locale-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-locale-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-locale-debuginfo-2.26-lp150.11.3.2.i686.rpm
glibc-profile-2.26-lp150.11.3.2.i686.rpm
glibc-profile-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-2.26-lp150.11.3.2.i586.rpm
glibc-utils-32bit-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-32bit-debuginfo-2.26-lp150.11.3.2.x86_64.rpm
glibc-utils-debuginfo-2.26-lp150.11.3.2.i586.rpm
glibc-utils-src-debugsource-2.26-lp150.11.3.2.i586.rpm
openSUSE-2018-601
Security update for slf4j
important
openSUSE Leap 15.0 Update
This update for slf4j fixes the following security issue:
- CVE-2018-8088: Remote attackers could have bypassed intended access
restrictions via crafted data. Disallow EventData deserialization by default
from now on (bsc#1085970).
slf4j-1.7.12-lp150.4.3.1.noarch.rpm
slf4j-1.7.12-lp150.4.3.1.src.rpm
slf4j-javadoc-1.7.12-lp150.4.3.1.noarch.rpm
slf4j-manual-1.7.12-lp150.4.3.1.noarch.rpm
openSUSE-2018-602
Security update for libvirt
important
openSUSE Leap 15.0 Update
This update for libvirt fixes the following issues:
This update fixes the following security issue:
- Added support for 'ssbd' and 'virt-ssbd' CPUID feature bits (CVE-2018-3639, boo#1092885)
libvirt-4.0.0-lp150.7.3.1.src.rpm
libvirt-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-admin-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-admin-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-client-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-client-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-config-network-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-config-nwfilter-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-interface-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-interface-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-libxl-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-libxl-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-lxc-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-lxc-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-network-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-network-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-nodedev-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-nodedev-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-nwfilter-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-nwfilter-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-qemu-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-qemu-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-secret-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-secret-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-core-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-core-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-disk-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-disk-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-logical-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-logical-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-mpath-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-mpath-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-rbd-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-rbd-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-scsi-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-scsi-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-uml-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-uml-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-vbox-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-driver-vbox-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-hooks-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-lxc-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-qemu-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-uml-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-vbox-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-daemon-xen-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-debugsource-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-devel-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-doc-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-libs-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-libs-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-lock-sanlock-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-lock-sanlock-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-nss-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-nss-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
wireshark-plugin-libvirt-4.0.0-lp150.7.3.1.x86_64.rpm
wireshark-plugin-libvirt-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-4.0.0-lp150.7.3.1.i586.rpm
libvirt-admin-4.0.0-lp150.7.3.1.i586.rpm
libvirt-admin-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-client-32bit-debuginfo-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-client-4.0.0-lp150.7.3.1.i586.rpm
libvirt-client-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-config-network-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-config-nwfilter-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-interface-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-interface-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-lxc-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-lxc-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-network-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-network-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-nodedev-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-nodedev-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-nwfilter-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-nwfilter-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-qemu-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-qemu-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-secret-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-secret-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-core-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-core-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-disk-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-disk-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-iscsi-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-iscsi-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-logical-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-logical-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-mpath-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-mpath-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-scsi-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-storage-scsi-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-uml-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-uml-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-vbox-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-driver-vbox-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-hooks-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-lxc-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-qemu-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-uml-4.0.0-lp150.7.3.1.i586.rpm
libvirt-daemon-vbox-4.0.0-lp150.7.3.1.i586.rpm
libvirt-debugsource-4.0.0-lp150.7.3.1.i586.rpm
libvirt-devel-32bit-4.0.0-lp150.7.3.1.x86_64.rpm
libvirt-devel-4.0.0-lp150.7.3.1.i586.rpm
libvirt-doc-4.0.0-lp150.7.3.1.i586.rpm
libvirt-libs-4.0.0-lp150.7.3.1.i586.rpm
libvirt-libs-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-lock-sanlock-4.0.0-lp150.7.3.1.i586.rpm
libvirt-lock-sanlock-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
libvirt-nss-4.0.0-lp150.7.3.1.i586.rpm
libvirt-nss-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
wireshark-plugin-libvirt-4.0.0-lp150.7.3.1.i586.rpm
wireshark-plugin-libvirt-debuginfo-4.0.0-lp150.7.3.1.i586.rpm
openSUSE-2018-568
Recommended update for patch
low
openSUSE Leap 15.0 Update
This update for patch fixes the following issue:
- Fixed a temporary file leak when applying ed-style patches (boo#1092500).
patch-2.7.6-lp150.3.3.1.src.rpm
patch-2.7.6-lp150.3.3.1.x86_64.rpm
patch-debuginfo-2.7.6-lp150.3.3.1.x86_64.rpm
patch-debugsource-2.7.6-lp150.3.3.1.x86_64.rpm
patch-2.7.6-lp150.3.3.1.i586.rpm
patch-debuginfo-2.7.6-lp150.3.3.1.i586.rpm
patch-debugsource-2.7.6-lp150.3.3.1.i586.rpm
openSUSE-2018-603
Security update for qemu
important
openSUSE Leap 15.0 Update
This update for qemu fixes the following issues:
This security issue was fixed:
- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).
Systems with microprocessors utilizing speculative execution and speculative
execution of memory reads before the addresses of all prior memory writes are
known may allow unauthorized disclosure of information to an attacker with
local user access via a side-channel analysis.
This patch permits the new x86 cpu feature flag named "ssbd" to be
presented to the guest, given that the host has this feature, and
KVM exposes it to the guest as well.
For this feature to be enabled please use the qemu commandline
-cpu $MODEL,+spec-ctrl,+ssbd
so the guest OS can take advantage of the feature.
spec-ctrl and ssbd support is also required in the host.
This non-security issue was fixed:
- Fix qemu-guest-agent uninstall (boo#1093169)
qemu-linux-user-2.11.1-lp150.7.3.1.src.rpm
qemu-linux-user-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-linux-user-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-linux-user-debugsource-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-testsuite-2.11.1-lp150.7.3.1.src.rpm
qemu-testsuite-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-2.11.1-lp150.7.3.1.src.rpm
qemu-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-arm-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-arm-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-curl-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-curl-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-dmg-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-dmg-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-gluster-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-gluster-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-iscsi-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-iscsi-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-rbd-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-rbd-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-ssh-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-block-ssh-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-debugsource-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-extra-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-extra-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-guest-agent-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-guest-agent-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-ipxe-1.0.0-lp150.7.3.1.noarch.rpm
qemu-ksm-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-kvm-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-lang-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-ppc-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-ppc-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-s390-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-s390-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-seabios-1.11.0-lp150.7.3.1.noarch.rpm
qemu-sgabios-8-lp150.7.3.1.noarch.rpm
qemu-tools-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-tools-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-vgabios-1.11.0-lp150.7.3.1.noarch.rpm
qemu-x86-2.11.1-lp150.7.3.1.x86_64.rpm
qemu-x86-debuginfo-2.11.1-lp150.7.3.1.x86_64.rpm
openSUSE-2018-572
Security update for mariadb
moderate
openSUSE Leap 15.0 Update
This update for mariadb to version 10.2.15 fixes the following issues:
These security issues were fixed:
- CVE-2018-2767: Enforse use of SSL/TLS in embedded server library (Return of
BACKRONYM) (bsc#1088681).
- CVE-2018-2786: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server as well as unauthorized update, insert or delete access to
some of MySQL Server accessible data (bsc#1089987).
- CVE-2018-2759: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987).
- CVE-2018-2777: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987).
- CVE-2018-2810: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987).
- CVE-2018-2782: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed low privileged
attacker with network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized ability to
cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
(bsc#1089987, bsc#1090518).
- CVE-2018-2784: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed low privileged
attacker with network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized ability to
cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
(bsc#1089987, bsc#1090518).
- CVE-2018-2787: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server as well as unauthorized update, insert or delete access to
some of MySQL Server accessible data (bsc#1089987, bsc#1090518).
- CVE-2018-2766: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed high
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2755: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Replication). Difficult to exploit vulnerability allowed
unauthenticated attacker with logon to the infrastructure where MySQL Server
executes to compromise MySQL Server. Successful attacks require human
interaction from a person other than the attacker and while the vulnerability
is in MySQL Server, attacks may significantly impact additional products.
Successful attacks of this vulnerability can result in takeover of MySQL Server
(bsc#1089987, bsc#1090518).
- CVE-2018-2819: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: InnoDB). Easily exploitable vulnerability allowed low privileged
attacker with network access via multiple protocols to compromise MySQL Server.
Successful attacks of this vulnerability can result in unauthorized ability to
cause a hang or frequently repeatable crash (complete DOS) of MySQL Server
(bsc#1089987, bsc#1090518).
- CVE-2018-2817: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: DDL). Easily exploitable vulnerability allowed low
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2761: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Client programs). Difficult to exploit vulnerability allowed
unauthenticated attacker with network access via multiple protocols to
compromise MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2781: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Optimizer). Easily exploitable vulnerability allowed
high privileged attacker with network access via multiple protocols to
compromise MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2771: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: Locking). Difficult to exploit vulnerability allowed
high privileged attacker with network access via multiple protocols to
compromise MySQL Server. Successful attacks of this vulnerability can result in
unauthorized ability to cause a hang or frequently repeatable crash (complete
DOS) of MySQL Server (bsc#1089987, bsc#1090518).
- CVE-2018-2813: Vulnerability in the MySQL Server component of Oracle MySQL
(subcomponent: Server: DDL). Easily exploitable vulnerability allowed low
privileged attacker with network access via multiple protocols to compromise
MySQL Server. Successful attacks of this vulnerability can result in
unauthorized read access to a subset of MySQL Server accessible data
(bsc#1089987, bsc#1090518).
These non-security issues were fixed:
- PCRE updated to 8.42
- Incomplete validation of missing tablespace during recovery
- ib_buffer_pool unnecessarily includes the temporary tablespace
- InnoDB may write uninitialized garbage to redo log
- Virtual Columns: Assertion failed in dict_table_get_col_name
- slow innodb startup/shutdown can exceed systemd timeout
- Assertion failed in dict_check_sys_tables on upgrade from 5.5
- Change buffer crash during TRUNCATE or DROP TABLE
- temporary table ROLLBACK fixes
For additional details please see
- https://mariadb.com/kb/en/library/mariadb-10215-release-notes
- https://mariadb.com/kb/en/library/mariadb-10215-changelog
libmysqld-devel-10.2.15-lp150.2.3.2.x86_64.rpm
libmysqld19-10.2.15-lp150.2.3.2.x86_64.rpm
libmysqld19-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-10.2.15-lp150.2.3.2.src.rpm
mariadb-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-bench-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-bench-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-client-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-client-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-debugsource-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-errormessages-10.2.15-lp150.2.3.2.noarch.rpm
mariadb-galera-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-test-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-test-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-tools-10.2.15-lp150.2.3.2.x86_64.rpm
mariadb-tools-debuginfo-10.2.15-lp150.2.3.2.x86_64.rpm
libmysqld-devel-10.2.15-lp150.2.3.2.i586.rpm
libmysqld19-10.2.15-lp150.2.3.2.i586.rpm
libmysqld19-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-10.2.15-lp150.2.3.2.i586.rpm
mariadb-bench-10.2.15-lp150.2.3.2.i586.rpm
mariadb-bench-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-client-10.2.15-lp150.2.3.2.i586.rpm
mariadb-client-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-debugsource-10.2.15-lp150.2.3.2.i586.rpm
mariadb-galera-10.2.15-lp150.2.3.2.i586.rpm
mariadb-test-10.2.15-lp150.2.3.2.i586.rpm
mariadb-test-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
mariadb-tools-10.2.15-lp150.2.3.2.i586.rpm
mariadb-tools-debuginfo-10.2.15-lp150.2.3.2.i586.rpm
openSUSE-2018-577
Recommended update for yast2-storage-ng
low
openSUSE Leap 15.0 Update
This update for yast2-storage-ng fixes the following issues:
- Partitioner: Fixed an error when creating new BTRFS subvolumes in
an installed system (boo#1067510)
- Partitioner: Handle limitations for volume labels (boo#1084867)
- Partitioner: Allow to move partitions (part of fate#318196)
yast2-storage-ng-4.0.186-lp150.2.6.1.src.rpm
yast2-storage-ng-4.0.186-lp150.2.6.1.x86_64.rpm
yast2-storage-ng-4.0.186-lp150.2.6.1.i586.rpm
openSUSE-2018-592
Security update for mupdf
moderate
openSUSE Leap 15.0 Update
This update for mupdf fixes the following security issue:
- CVE-2018-1000051: Prevent use after free in fz_keep_key_storable that can
result in DOS / possible code execution. This attack appear to be exploitable
via Victim opens a specially crafted PDF (bsc#1080531).
mupdf-1.12.0-lp150.3.3.1.src.rpm
mupdf-1.12.0-lp150.3.3.1.x86_64.rpm
mupdf-debuginfo-1.12.0-lp150.3.3.1.x86_64.rpm
mupdf-debugsource-1.12.0-lp150.3.3.1.x86_64.rpm
mupdf-devel-static-1.12.0-lp150.3.3.1.x86_64.rpm
mupdf-1.12.0-lp150.3.3.1.i586.rpm
mupdf-debuginfo-1.12.0-lp150.3.3.1.i586.rpm
mupdf-debugsource-1.12.0-lp150.3.3.1.i586.rpm
mupdf-devel-static-1.12.0-lp150.3.3.1.i586.rpm
openSUSE-2018-578
Recommended update for autoyast2
low
openSUSE Leap 15.0 Update
This update for autoyast2 fixes the following issues:
- Partition configuration: Do not ask for saving values if they have
not been changed at all. (boo#1082556)
- Using new libstorage-ng in order to handle "label" tag in URL.
E.G.: autoyast=label://my_home//autoinst.xml (boo#1094533)
autoyast2-4.0.55-lp150.2.3.1.noarch.rpm
autoyast2-4.0.55-lp150.2.3.1.src.rpm
autoyast2-installation-4.0.55-lp150.2.3.1.noarch.rpm
openSUSE-2018-604
Recommended update for guix
moderate
openSUSE Leap 15.0 Update
This update for guix fixes the following issues:
- Bugfix: package fetching via https was not possible (boo#1095970)
guix-0.14.0-lp150.2.3.1.src.rpm
guix-0.14.0-lp150.2.3.1.x86_64.rpm
guix-debuginfo-0.14.0-lp150.2.3.1.x86_64.rpm
guix-debugsource-0.14.0-lp150.2.3.1.x86_64.rpm
openSUSE-2018-627
Security update for taglib
low
openSUSE Leap 15.0 Update
This update for taglib fixes this security issues:
- CVE-2018-11439: The TagLib::Ogg::FLAC::File::scan function allowed remote
attackers to cause information disclosure (heap-based buffer over-read) via a
crafted audio file (bsc#1096180).
libtag-devel-1.11.1-lp150.3.3.1.x86_64.rpm
libtag1-1.11.1-lp150.3.3.1.x86_64.rpm
libtag1-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
libtag_c0-1.11.1-lp150.3.3.1.x86_64.rpm
libtag_c0-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
taglib-1.11.1-lp150.3.3.1.src.rpm
taglib-1.11.1-lp150.3.3.1.x86_64.rpm
taglib-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
taglib-debugsource-1.11.1-lp150.3.3.1.x86_64.rpm
libtag-devel-1.11.1-lp150.3.3.1.i586.rpm
libtag1-1.11.1-lp150.3.3.1.i586.rpm
libtag1-32bit-1.11.1-lp150.3.3.1.x86_64.rpm
libtag1-32bit-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
libtag1-debuginfo-1.11.1-lp150.3.3.1.i586.rpm
libtag_c0-1.11.1-lp150.3.3.1.i586.rpm
libtag_c0-32bit-1.11.1-lp150.3.3.1.x86_64.rpm
libtag_c0-32bit-debuginfo-1.11.1-lp150.3.3.1.x86_64.rpm
libtag_c0-debuginfo-1.11.1-lp150.3.3.1.i586.rpm
taglib-1.11.1-lp150.3.3.1.i586.rpm
taglib-debuginfo-1.11.1-lp150.3.3.1.i586.rpm
taglib-debugsource-1.11.1-lp150.3.3.1.i586.rpm
openSUSE-2018-579
Optional update to add pam_ldap
moderate
openSUSE Leap 15.0 Update
This optional update adds pam_ldap to the distribution.
The pam_ldap is required for LDAP configuration in YaST2. (boo#1096173)
pam_ldap-186-lp150.2.1.src.rpm
pam_ldap-186-lp150.2.1.x86_64.rpm
pam_ldap-debuginfo-186-lp150.2.1.x86_64.rpm
pam_ldap-debugsource-186-lp150.2.1.x86_64.rpm
openSUSE-2018-581
Recommended update for yast2
moderate
openSUSE Leap 15.0 Update
This update for yast2 fixes the following issues:
- Display proper release notes for product (bsc#1096138)
- Rename SLES_HPC to SLE_HPC (bsc#1095053)
- Calling YAST module: Do not create a post Snapper image if the pre Snapper image has
already been failed (bsc#1093374)
yast2-4.0.77-lp150.2.3.1.src.rpm
yast2-4.0.77-lp150.2.3.1.x86_64.rpm
yast2-4.0.77-lp150.2.3.1.i586.rpm
openSUSE-2018-589
Security update for curl
moderate
openSUSE Leap 15.0 Update
This update for curl to version 7.60.0 fixes the following issues:
These security issues were fixed:
- CVE-2018-1000300: Prevent heap-based buffer overflow when closing down an FTP
connection with very long server command replies (bsc#1092094).
- CVE-2018-1000301: Prevent buffer over-read that could have cause reading data
beyond the end of a heap based buffer used to store downloaded RTSP content
(bsc#1092098).
These non-security issues were fixed:
- Add CURLOPT_HAPROXYPROTOCOL, support for the HAProxy PROXY protocol
- Add --haproxy-protocol for the command line tool
- Add CURLOPT_DNS_SHUFFLE_ADDRESSES, shuffle returned IP addresses
- FTP: fix typo in recursive callback detection for seeking
- test1208: marked flaky
- HTTP: make header-less responses still count correct body size
- user-agent.d:: mention --proxy-header as well
- http2: fixes typo
- cleanup: misc typos in strings and comments
- rate-limit: use three second window to better handle high speeds
- examples/hiperfifo.c: improved
- pause: when changing pause state, update socket state
- curl_version_info.3: fix ssl_version description
- add_handle/easy_perform: clear errorbuffer on start if set
- cmake: add support for brotli
- parsedate: support UT timezone
- vauth/ntlm.h: fix the #ifdef header guard
- lib/curl_path.h: added #ifdef header guard
- vauth/cleartext: fix integer overflow check
- CURLINFO_COOKIELIST.3: made the example not leak memory
- cookie.d: mention that "-" as filename means stdin
- CURLINFO_SSL_VERIFYRESULT.3: fixed the example
- http2: read pending frames (including GOAWAY) in connection-check
- timeval: remove compilation warning by casting
- cmake: avoid warn-as-error during config checks
- travis-ci: enable -Werror for CMake builds
- openldap: fix for NULL return from ldap_get_attribute_ber()
- threaded resolver: track resolver time and set suitable timeout values
- cmake: Add advapi32 as explicit link library for win32
- docs: fix CURLINFO_*_T examples use of CURL_FORMAT_CURL_OFF_T
- test1148: set a fixed locale for the test
- cookies: when reading from a file, only remove_expired once
- cookie: store cookies per top-level-domain-specific hash table
- openssl: RESTORED verify locations when verifypeer==0
- file: restore old behavior for file:////foo/bar URLs
- FTP: allow PASV on IPv6 connections when a proxy is being used
- build-openssl.bat: allow custom paths for VS and perl
- winbuild: make the clean target work without build-type
- build-openssl.bat: Refer to VS2017 as VC14.1 instead of VC15
- curl: retry on FTP 4xx, ignore other protocols
- configure: detect (and use) sa_family_t
- examples/sftpuploadresume: Fix Windows large file seek
- build: cleanup to fix clang warnings/errors
- winbuild: updated the documentation
- lib: silence null-dereference warnings
- travis: bump to clang 6 and gcc 7
- travis: build libpsl and make builds use it
- proxy: show getenv proxy use in verbose output
- duphandle: make sure CURLOPT_RESOLVE is duplicated
- all: Refactor malloc+memset to use calloc
- checksrc: Fix typo
- system.h: Add sparcv8plus to oracle/sunpro 32-bit detection
- vauth: Fix typo
- ssh: show libSSH2 error code when closing fails
- test1148: tolerate progress updates better
- urldata: make service names unconditional
- configure: keep LD_LIBRARY_PATH changes local
- ntlm_sspi: fix authentication using Credential Manager
- schannel: add client certificate authentication
- winbuild: Support custom devel paths for each dependency
- schannel: add support for CURLOPT_CAINFO
- http2: handle on_begin_headers() called more than once
- openssl: support OpenSSL 1.1.1 verbose-mode trace messages
- openssl: fix subjectAltName check on non-ASCII platforms
- http2: avoid strstr() on data not zero terminated
- http2: clear the "drain counter" when a stream is closed
- http2: handle GOAWAY properly
- tool_help: clarify --max-time unit of time is seconds
- curl.1: clarify that options and URLs can be mixed
- http2: convert an assert to run-time check
- curl_global_sslset: always provide available backends
- ftplistparser: keep state between invokes
- Curl_memchr: zero length input can't match
- examples/sftpuploadresume: typecast fseek argument to long
- examples/http2-upload: expand buffer to avoid silly warning
- ctype: restore character classification for non-ASCII platforms
- mime: avoid NULL pointer dereference risk
- cookies: ensure that we have cookies before writing jar
- os400.c: fix checksrc warnings
- configure: provide --with-wolfssl as an alias for --with-cyassl
- cyassl: adapt to libraries without TLS 1.0 support built-in
- http2: get rid of another strstr
- checksrc: force indentation of lines after an else
- cookies: remove unused macro
- CURLINFO_PROTOCOL.3: mention the existing defined names
- tests: provide 'manual' as a feature to optionally require
- travis: enable libssh2 on both macos and Linux
- CURLOPT_URL.3: added ENCODING section
- wolfssl: Fix non-blocking connect
- vtls: don't define MD5_DIGEST_LENGTH for wolfssl
- docs: remove extraneous commas in man pages
- URL: fix ASCII dependency in strcpy_url and strlen_url
- ssh-libssh.c: fix left shift compiler warning
- configure: only check for CA bundle for file-using SSL backends
- travis: add an mbedtls build
- http: don't set the "rewind" flag when not uploading anything
- configure: put CURLDEBUG and DEBUGBUILD in lib/curl_config.h
- transfer: don't unset writesockfd on setup of multiplexed conns
- vtls: use unified "supports" bitfield member in backends
- URLs: fix one more http url
- travis: add a build using WolfSSL
- openssl: change FILE ops to BIO ops
- travis: add build using NSS
- smb: reject negative file sizes
- cookies: accept parameter names as cookie name
- http2: getsock fix for uploads
- all over: fixed format specifiers
- http2: use the correct function pointer typedef
curl-mini-7.60.0-lp150.2.3.1.src.rpm
curl-mini-7.60.0-lp150.2.3.1.x86_64.rpm
curl-mini-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
curl-mini-debugsource-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl-mini-devel-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-mini-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-mini-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
curl-7.60.0-lp150.2.3.1.src.rpm
curl-7.60.0-lp150.2.3.1.x86_64.rpm
curl-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
curl-debugsource-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl-devel-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
curl-mini-7.60.0-lp150.2.3.1.i586.rpm
curl-mini-debuginfo-7.60.0-lp150.2.3.1.i586.rpm
curl-mini-debugsource-7.60.0-lp150.2.3.1.i586.rpm
libcurl-mini-devel-7.60.0-lp150.2.3.1.i586.rpm
libcurl4-mini-7.60.0-lp150.2.3.1.i586.rpm
libcurl4-mini-debuginfo-7.60.0-lp150.2.3.1.i586.rpm
curl-7.60.0-lp150.2.3.1.i586.rpm
curl-debuginfo-7.60.0-lp150.2.3.1.i586.rpm
curl-debugsource-7.60.0-lp150.2.3.1.i586.rpm
libcurl-devel-32bit-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl-devel-7.60.0-lp150.2.3.1.i586.rpm
libcurl4-32bit-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-32bit-debuginfo-7.60.0-lp150.2.3.1.x86_64.rpm
libcurl4-7.60.0-lp150.2.3.1.i586.rpm
libcurl4-debuginfo-7.60.0-lp150.2.3.1.i586.rpm
openSUSE-2018-629
Security update for opencv
moderate
openSUSE Leap 15.0 Update
This update for opencv fixes this security issue:
- CVE-2017-18009: Prevent heap-based buffer over-read in the function
cv::HdrDecoder::checkSignature (bsc#1074312).
libopencv3_3-3.3.1-lp150.4.3.1.x86_64.rpm
libopencv3_3-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-3.3.1-lp150.4.3.1.src.rpm
opencv-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-debugsource-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-devel-3.3.1-lp150.4.3.1.x86_64.rpm
opencv-doc-3.3.1-lp150.4.3.1.x86_64.rpm
python2-opencv-3.3.1-lp150.4.3.1.x86_64.rpm
python2-opencv-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm
python3-opencv-3.3.1-lp150.4.3.1.x86_64.rpm
python3-opencv-debuginfo-3.3.1-lp150.4.3.1.x86_64.rpm
openSUSE-2018-585
Recommended update for biosdevname
moderate
openSUSE Leap 15.0 Update
This update for biosdevname fixes the following issues:
- biosdevname could crash due to an infinite recursion (boo#1093625)
biosdevname-0.7.3-lp150.3.3.1.src.rpm
biosdevname-0.7.3-lp150.3.3.1.x86_64.rpm
biosdevname-debuginfo-0.7.3-lp150.3.3.1.x86_64.rpm
biosdevname-debugsource-0.7.3-lp150.3.3.1.x86_64.rpm
biosdevname-0.7.3-lp150.3.3.1.i586.rpm
biosdevname-debuginfo-0.7.3-lp150.3.3.1.i586.rpm
biosdevname-debugsource-0.7.3-lp150.3.3.1.i586.rpm
openSUSE-2018-583
Recommended update for cloud-init
moderate
openSUSE Leap 15.0 Update
This update for cloud-init fixes the following issues:
- cloud-init may have reported "no datasource found (boo#1089824, boo#1093501)
This bugfix is an improvement on a previous change.
cloud-init-18.2-lp150.2.6.1.src.rpm
cloud-init-18.2-lp150.2.6.1.x86_64.rpm
cloud-init-config-suse-18.2-lp150.2.6.1.x86_64.rpm
cloud-init-doc-18.2-lp150.2.6.1.x86_64.rpm
openSUSE-2018-587
Recommended update for crmsh
moderate
openSUSE Leap 15.0 Update
This update for crmsh fixes the following issues:
- bash_completion: non-interactive mode completer did not work (boo#1090304)
- terminal could have lost cursor after typing ctrl+c (boo#1090626)
- Wrong prompt string after poped help messages when input at a new line (boo#1090140)
- Documentation formatting issue (boo#1075764)
crmsh-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.noarch.rpm
crmsh-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.src.rpm
crmsh-scripts-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.noarch.rpm
crmsh-test-4.0.0+git.1526547258.54aafa1d-lp150.2.3.1.noarch.rpm
openSUSE-2018-588
Recommended update for filesystem
moderate
openSUSE Leap 15.0 Update
This update for filesystem fixes the following issues:
- possible shutdown issues after upgrading from an older release (boo#1084119)
filesystem-15.0-lp150.8.3.1.src.rpm
filesystem-15.0-lp150.8.3.1.x86_64.rpm
filesystem-15.0-lp150.8.3.1.i586.rpm
openSUSE-2018-584
Recommended update for google-compute-engine
important
openSUSE Leap 15.0 Update
This update for google-compute-engine fixes the following issues:
- Instance initialization failed due to an incompatibility with Python 3 (boo#1094074)
google-compute-engine-20180510-lp150.2.6.1.src.rpm
google-compute-engine-init-20180510-lp150.2.6.1.noarch.rpm
google-compute-engine-oslogin-20180510-lp150.2.6.1.x86_64.rpm
google-compute-engine-oslogin-debuginfo-20180510-lp150.2.6.1.x86_64.rpm
google-compute-engine-oslogin-20180510-lp150.2.6.1.i586.rpm
google-compute-engine-oslogin-32bit-20180510-lp150.2.6.1.x86_64.rpm
google-compute-engine-oslogin-32bit-debuginfo-20180510-lp150.2.6.1.x86_64.rpm
google-compute-engine-oslogin-debuginfo-20180510-lp150.2.6.1.i586.rpm
openSUSE-2018-575
Security update for MozillaFirefox, mozilla-nss
important
openSUSE Leap 15.0 Update
This update for MozillaFirefox, mozilla-nss fixes the following issues:
Security issue fixed in Mozilla Firefox 60.0.2 ESR:
- CVE-2018-6126: Heap buffer overflow rasterizing paths in SVG with Skia (MFSA 2018-14, boo#1096449)
The following bugs were fixed:
- In KDE Open with option in download dialog has no effect with kmozillahelper (boo#1094747)
- Startup crashes on aarch64 (boo#1093059)
Mozilla Firefox now requires NSS 3.36.4 (boo#1096515). The following changes are included in NSS:
- Fix issues connecting to servers recently upgraded to TLS 1.3 (SSL_RX_MALFORMED_SERVER_HELLO error)
- Fix a rare bug with PKCS#12 files
- Apply additional harding (relro linker option)
MozillaFirefox-60.0.2-lp150.3.6.1.src.rpm
MozillaFirefox-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-branding-upstream-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-buildsymbols-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-debuginfo-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-debugsource-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-devel-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-translations-common-60.0.2-lp150.3.6.1.x86_64.rpm
MozillaFirefox-translations-other-60.0.2-lp150.3.6.1.x86_64.rpm
libfreebl3-3.36.4-lp150.2.3.1.x86_64.rpm
libfreebl3-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
libsoftokn3-3.36.4-lp150.2.3.1.x86_64.rpm
libsoftokn3-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-3.36.4-lp150.2.3.1.src.rpm
mozilla-nss-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-debugsource-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-devel-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-sysinit-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-sysinit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-tools-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-tools-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
libfreebl3-3.36.4-lp150.2.3.1.i586.rpm
libfreebl3-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
libfreebl3-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
libfreebl3-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
libsoftokn3-3.36.4-lp150.2.3.1.i586.rpm
libsoftokn3-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
libsoftokn3-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
libsoftokn3-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-certs-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-certs-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-debugsource-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-devel-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-sysinit-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-sysinit-32bit-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-sysinit-32bit-debuginfo-3.36.4-lp150.2.3.1.x86_64.rpm
mozilla-nss-sysinit-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-tools-3.36.4-lp150.2.3.1.i586.rpm
mozilla-nss-tools-debuginfo-3.36.4-lp150.2.3.1.i586.rpm
openSUSE-2018-593
Recommended update for yast2-proxy
moderate
openSUSE Leap 15.0 Update
This update for yast2-proxy fixes the following issues:
- Clean up of 'No Proxy Domains' field when whitespaces are detected (bsc#1089796)
yast2-proxy-4.0.1-lp150.2.3.1.noarch.rpm
yast2-proxy-4.0.1-lp150.2.3.1.src.rpm
openSUSE-2018-594
Recommended update for yast2-printer
moderate
openSUSE Leap 15.0 Update
This update for yast2-printer fixes the following issues:
- Fixed alignment of input fields in "Connection Wizard". (bsc#1091290)
yast2-printer-4.0.2-lp150.2.3.1.src.rpm
yast2-printer-4.0.2-lp150.2.3.1.x86_64.rpm
yast2-printer-debuginfo-4.0.2-lp150.2.3.1.x86_64.rpm
yast2-printer-debugsource-4.0.2-lp150.2.3.1.x86_64.rpm
yast2-printer-4.0.2-lp150.2.3.1.i586.rpm
yast2-printer-debuginfo-4.0.2-lp150.2.3.1.i586.rpm
yast2-printer-debugsource-4.0.2-lp150.2.3.1.i586.rpm
openSUSE-2018-608
Recommended update for libstorage-ng
important
openSUSE Leap 15.0 Update
This update for libstorage-ng fixes the following issues:
- multiple translation updates
- YaST error caused when auto-mounting ext4 partition on Xen PV device after FS resize (boo#1073633)
- error creating partitions on GPT not using complete disk (boo#1092193)
- A message "Probing partitions failed" while Installation could be shown on Power (boo#1095168)
- Avoid functional conflicts with libdmraid during upgrade (boo#1088570)
- issues probing storage of certain nvme systems (boo#1093684)
libstorage-ng-3.3.300-lp150.2.3.2.src.rpm
libstorage-ng-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-debugsource-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-devel-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-integration-tests-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-lang-3.3.300-lp150.2.3.2.noarch.rpm
libstorage-ng-python3-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-python3-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-ruby-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-ruby-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-utils-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-utils-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng1-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng1-debuginfo-3.3.300-lp150.2.3.2.x86_64.rpm
libstorage-ng-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-debugsource-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-devel-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-integration-tests-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-python3-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-python3-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-ruby-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-ruby-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-utils-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng-utils-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng1-3.3.300-lp150.2.3.2.i586.rpm
libstorage-ng1-debuginfo-3.3.300-lp150.2.3.2.i586.rpm
openSUSE-2018-595
Recommended update for yast2-pkg-bindings-devel-doc
moderate
openSUSE Leap 15.0 Update
This update for yast2-pkg-bindings-devel-doc fixes the following issues:
- Bugfix: Do not reset the source manager if also the options are the same as the ones
used previously (bsc#1095702)
yast2-pkg-bindings-devel-doc-4.0.11-lp150.2.6.1.noarch.rpm
yast2-pkg-bindings-devel-doc-4.0.11-lp150.2.6.1.src.rpm
yast2-pkg-bindings-4.0.11-lp150.2.6.1.src.rpm
yast2-pkg-bindings-4.0.11-lp150.2.6.1.x86_64.rpm
yast2-pkg-bindings-debuginfo-4.0.11-lp150.2.6.1.x86_64.rpm
yast2-pkg-bindings-debugsource-4.0.11-lp150.2.6.1.x86_64.rpm
yast2-pkg-bindings-4.0.11-lp150.2.6.1.i586.rpm
yast2-pkg-bindings-debuginfo-4.0.11-lp150.2.6.1.i586.rpm
yast2-pkg-bindings-debugsource-4.0.11-lp150.2.6.1.i586.rpm
openSUSE-2018-606
Recommended update for ibmtss
moderate
openSUSE Leap 15.0 Update
This update for ibmtss fixes the following issues:
- the ibmtss utility was missing the libtss.so.0 library (boo#1093612)
ibmtss-1045-lp150.3.3.1.src.rpm
ibmtss-1045-lp150.3.3.1.x86_64.rpm
ibmtss-base-1045-lp150.3.3.1.noarch.rpm
ibmtss-debuginfo-1045-lp150.3.3.1.x86_64.rpm
ibmtss-debugsource-1045-lp150.3.3.1.x86_64.rpm
ibmtss-devel-1045-lp150.3.3.1.x86_64.rpm
libtss0-1045-lp150.3.3.1.x86_64.rpm
libtss0-debuginfo-1045-lp150.3.3.1.x86_64.rpm
openSUSE-2018-605
Recommended update for cargo
low
openSUSE Leap 15.0 Update
This update for cargo contains the following change:
- cargo 0.26.0 is provided as imported from the SLE 15 codebase (boo#1096770)
- No longer removes rust or rs prefixs/suffixs.
- Now defaults to creating a binary crate, instead of a library crate
cargo-0.26.0-lp150.2.3.4.src.rpm
cargo-0.26.0-lp150.2.3.4.x86_64.rpm
cargo-debuginfo-0.26.0-lp150.2.3.4.x86_64.rpm
cargo-0.26.0-lp150.2.3.4.i686.rpm
cargo-debuginfo-0.26.0-lp150.2.3.4.i686.rpm
openSUSE-2018-611
Recommended update for hyper-v
moderate
openSUSE Leap 15.0 Update
This update for hyper-v fixes the following issues:
- Running lsvmbus may have failed due to an incorrect interpreter string (boo#1093910)
hyper-v-7-lp150.4.3.2.src.rpm
hyper-v-7-lp150.4.3.2.x86_64.rpm
hyper-v-debuginfo-7-lp150.4.3.2.x86_64.rpm
hyper-v-debugsource-7-lp150.4.3.2.x86_64.rpm
hyper-v-7-lp150.4.3.2.i586.rpm
hyper-v-debuginfo-7-lp150.4.3.2.i586.rpm
hyper-v-debugsource-7-lp150.4.3.2.i586.rpm
openSUSE-2018-607
Recommended update for issue-generator
moderate
openSUSE Leap 15.0 Update
This update for issue-generator fixes the following issues:
- Permission issue on /run/issue which was root readable only (boo#1095697)
issue-generator-1.6-lp150.3.6.2.noarch.rpm
issue-generator-1.6-lp150.3.6.2.src.rpm
openSUSE-2018-609
Recommended update for sysconfig
moderate
openSUSE Leap 15.0 Update
This update for sysconfig fixes the following issues:
- When using NetworkManager but some interfaces are not managed my NetworkManager,
such as when using a VPN client directly, the DNS entries were not set correctly (boo#1079793)
sysconfig-0.84.3-lp150.3.3.2.src.rpm
sysconfig-0.84.3-lp150.3.3.2.x86_64.rpm
sysconfig-debuginfo-0.84.3-lp150.3.3.2.x86_64.rpm
sysconfig-debugsource-0.84.3-lp150.3.3.2.x86_64.rpm
sysconfig-netconfig-0.84.3-lp150.3.3.2.x86_64.rpm
sysconfig-0.84.3-lp150.3.3.2.i586.rpm
sysconfig-debuginfo-0.84.3-lp150.3.3.2.i586.rpm
sysconfig-debugsource-0.84.3-lp150.3.3.2.i586.rpm
sysconfig-netconfig-0.84.3-lp150.3.3.2.i586.rpm
openSUSE-2018-610
Recommended update for libgphoto2
moderate
openSUSE Leap 15.0 Update
This update for libgphoto2 fixes the following issues:
- Import of Photos from Canon EOS did not work correctly (boo#1091309)
libgphoto2-2.5.18-lp150.2.3.1.src.rpm
libgphoto2-6-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-debuginfo-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-lang-2.5.18-lp150.2.3.1.noarch.rpm
libgphoto2-debugsource-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-devel-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-devel-doc-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-doc-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-6-32bit-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-32bit-debuginfo-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-6-debuginfo-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-debugsource-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-devel-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-devel-32bit-2.5.18-lp150.2.3.1.x86_64.rpm
libgphoto2-devel-doc-2.5.18-lp150.2.3.1.i586.rpm
libgphoto2-doc-2.5.18-lp150.2.3.1.i586.rpm
openSUSE-2018-612
Recommended update for hawk2
important
openSUSE Leap 15.0 Update
This update for hawk2 fixes the following issues:
- UI may have reported a lowlevel error on certain errror conditions (boo#1090562)
- Editing a resource with a name that contains a dot resulted in a redirection to 404 page (boo#1092108)
- Help links seeded adjustment (boo#1089709)
- Issues loading history explorer views (boo#1093420)
- Primitive resource creation sometimes failed in Hawk (boo#1092122)
hawk2-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.src.rpm
hawk2-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.x86_64.rpm
hawk2-debuginfo-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.x86_64.rpm
hawk2-debugsource-2.1.0+git.1526638315.05cdaf9d-lp150.2.3.1.x86_64.rpm
openSUSE-2018-613
Recommended update for tmon
moderate
openSUSE Leap 15.0 Update
This update for tmon fixes the following issues:
- race condition related to "cur_thermal_record" caused segmentation faults (boo#1075156)
tmon-1.0-lp150.2.3.1.src.rpm
tmon-1.0-lp150.2.3.1.x86_64.rpm
tmon-debuginfo-1.0-lp150.2.3.1.x86_64.rpm
tmon-debugsource-1.0-lp150.2.3.1.x86_64.rpm
openSUSE-2018-615
Recommended update for rmt-server, yast2-rmt
moderate
openSUSE Leap 15.0 Update
This update contains the final releases for rmt-server and yast2-rmt (boo#1093879)
This updates contains various code and packaging fixes as released for SLE 15.
rmt-server is a Repository mirroring tool and registration proxy for SCC.
yast2-rmt is a YaST module for configuring it.
rmt-server-1.0.0-lp150.2.3.2.src.rpm
rmt-server-1.0.0-lp150.2.3.2.x86_64.rpm
rmt-server-debuginfo-1.0.0-lp150.2.3.2.x86_64.rpm
yast2-rmt-1.0.0-lp150.2.3.2.noarch.rpm
yast2-rmt-1.0.0-lp150.2.3.2.src.rpm
openSUSE-2018-622
Recommended update for yast2-packager
moderate
openSUSE Leap 15.0 Update
This update for yast2-packager fixes the following issues:
- When running the installation in textmode, consider only the preselected language when
showing the license for extensions, modules or add-ons (boo#1094793).
- During an upgrade, skip the base produce license dialog when the
same license was already accepted (boo#1080450)
- Renaming of SLES_HPC to SLE_HPC (boo#1095053)
- Display an error popup when the FIPS compliant mode is active and the "fips" pattern is
not available (boo#1093060)
yast2-packager-4.0.67-lp150.2.6.2.src.rpm
yast2-packager-4.0.67-lp150.2.6.2.x86_64.rpm
yast2-packager-4.0.67-lp150.2.6.2.i586.rpm
openSUSE-2018-617
Recommended update for jeos-firstboot
moderate
openSUSE Leap 15.0 Update
This update for jeos-firstboot fixes the following issues:
- licenses in non-latin scripts were not displayed incorrectly (boo#1094346)
jeos-firstboot-0.0+git20180525.280836a-lp150.2.3.1.noarch.rpm
jeos-firstboot-0.0+git20180525.280836a-lp150.2.3.1.src.rpm
openSUSE-2018-618
Recommended update for mksusecd
moderate
openSUSE Leap 15.0 Update
This update for mksusecd fixes the following issues:
- joliet file names on generated media were too long (boo#1094687)
mksusecd-1.59-lp150.2.3.1.src.rpm
mksusecd-1.59-lp150.2.3.1.x86_64.rpm
mksusecd-debuginfo-1.59-lp150.2.3.1.x86_64.rpm
mksusecd-debugsource-1.59-lp150.2.3.1.x86_64.rpm
openSUSE-2018-619
Recommended update for patterns-base
moderate
openSUSE Leap 15.0 Update
This update for patterns-base fixes the following issues:
- /var/log/messages did not exist because rsyslog was not included in the base pattern (boo#1094841)
Rsyslog is now part of the base pattern for logging to go to /var/log/messages as documented.
patterns-base-20171206-lp150.15.6.1.src.rpm
patterns-base-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-apparmor-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-apparmor-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-apparmor_opt-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-base-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-base-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-basesystem-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-console-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-documentation-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-enhanced_base-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-enhanced_base-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-enhanced_base_opt-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-minimal_base-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-minimal_base-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-sw_management-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-sw_management-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-transactional_base-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-update_test-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11_enhanced-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11_enhanced-32bit-20171206-lp150.15.6.1.x86_64.rpm
patterns-base-x11_opt-20171206-lp150.15.6.1.x86_64.rpm
openSUSE-2018-620
Recommended update for python-azure-agent
moderate
openSUSE Leap 15.0 Update
This update for python-azure-agent fixes the following issues:
- python-azure-agent uses obsolete nettools instead of ip tools (boo#1092831)
python-azure-agent-2.2.18-lp150.5.3.1.noarch.rpm
python-azure-agent-2.2.18-lp150.5.3.1.src.rpm
python-azure-agent-test-2.2.18-lp150.5.3.1.noarch.rpm
openSUSE-2018-621
Recommended update for util-linux
moderate
openSUSE Leap 15.0 Update
This update for util-linux fixes the following issues:
- the rfkill-block@.service and rfkill-unblock@service were run in the package pre/postun scripts
despite only being templates without parameters (boo#1092820, boo#1093176)
python-libmount-2.31.1-lp150.7.3.1.src.rpm
python-libmount-2.31.1-lp150.7.3.1.x86_64.rpm
python-libmount-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
python-libmount-debugsource-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-systemd-2.31.1-lp150.7.3.1.src.rpm
util-linux-systemd-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-systemd-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-systemd-debugsource-2.31.1-lp150.7.3.1.x86_64.rpm
uuidd-2.31.1-lp150.7.3.1.x86_64.rpm
uuidd-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid1-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libfdisk-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libfdisk-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libfdisk1-2.31.1-lp150.7.3.1.x86_64.rpm
libfdisk1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libmount-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libmount-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libmount1-2.31.1-lp150.7.3.1.x86_64.rpm
libmount1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libsmartcols-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libsmartcols-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libsmartcols1-2.31.1-lp150.7.3.1.x86_64.rpm
libsmartcols1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid-devel-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid-devel-static-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid1-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid1-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-2.31.1-lp150.7.3.1.src.rpm
util-linux-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-debugsource-2.31.1-lp150.7.3.1.x86_64.rpm
util-linux-lang-2.31.1-lp150.7.3.1.noarch.rpm
util-linux-systemd-2.31.1-lp150.7.3.1.i586.rpm
util-linux-systemd-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
util-linux-systemd-debugsource-2.31.1-lp150.7.3.1.i586.rpm
uuidd-2.31.1-lp150.7.3.1.i586.rpm
uuidd-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libblkid-devel-2.31.1-lp150.7.3.1.i586.rpm
libblkid-devel-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libblkid1-2.31.1-lp150.7.3.1.i586.rpm
libblkid1-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid1-32bit-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libblkid1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libfdisk-devel-2.31.1-lp150.7.3.1.i586.rpm
libfdisk-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libfdisk1-2.31.1-lp150.7.3.1.i586.rpm
libfdisk1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libmount-devel-2.31.1-lp150.7.3.1.i586.rpm
libmount-devel-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libmount-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libmount1-2.31.1-lp150.7.3.1.i586.rpm
libmount1-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libmount1-32bit-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libmount1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libsmartcols-devel-2.31.1-lp150.7.3.1.i586.rpm
libsmartcols-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libsmartcols1-2.31.1-lp150.7.3.1.i586.rpm
libsmartcols1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
libuuid-devel-2.31.1-lp150.7.3.1.i586.rpm
libuuid-devel-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid-devel-static-2.31.1-lp150.7.3.1.i586.rpm
libuuid1-2.31.1-lp150.7.3.1.i586.rpm
libuuid1-32bit-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid1-32bit-debuginfo-2.31.1-lp150.7.3.1.x86_64.rpm
libuuid1-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
util-linux-2.31.1-lp150.7.3.1.i586.rpm
util-linux-debuginfo-2.31.1-lp150.7.3.1.i586.rpm
util-linux-debugsource-2.31.1-lp150.7.3.1.i586.rpm
openSUSE-2018-624
Recommended update for systemd
important
openSUSE Leap 15.0 Update
This update for systemd fixes the following issues:
- Network did not start correctly when installing using a PCI network device (boo#1083158)
- User services should not be enabled by default (boo#1090785)
- udev: created /dev/disk/by-partlabel/primary and .../logical symlinks as these are contented names (boo#1089761)
libsystemd0-mini-234-lp150.20.3.1.x86_64.rpm
libsystemd0-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
libudev-mini-devel-234-lp150.20.3.1.x86_64.rpm
libudev-mini1-234-lp150.20.3.1.x86_64.rpm
libudev-mini1-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-mini-234-lp150.20.3.1.src.rpm
systemd-mini-234-lp150.20.3.1.x86_64.rpm
systemd-mini-bash-completion-234-lp150.20.3.1.noarch.rpm
systemd-mini-container-mini-234-lp150.20.3.1.x86_64.rpm
systemd-mini-container-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-mini-coredump-mini-234-lp150.20.3.1.x86_64.rpm
systemd-mini-coredump-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-mini-debugsource-234-lp150.20.3.1.x86_64.rpm
systemd-mini-devel-234-lp150.20.3.1.x86_64.rpm
systemd-mini-sysvinit-234-lp150.20.3.1.x86_64.rpm
udev-mini-234-lp150.20.3.1.x86_64.rpm
udev-mini-debuginfo-234-lp150.20.3.1.x86_64.rpm
libsystemd0-234-lp150.20.3.1.x86_64.rpm
libsystemd0-debuginfo-234-lp150.20.3.1.x86_64.rpm
libudev-devel-234-lp150.20.3.1.x86_64.rpm
libudev1-234-lp150.20.3.1.x86_64.rpm
libudev1-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-myhostname-234-lp150.20.3.1.x86_64.rpm
nss-myhostname-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-mymachines-234-lp150.20.3.1.x86_64.rpm
nss-mymachines-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-systemd-234-lp150.20.3.1.x86_64.rpm
nss-systemd-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-234-lp150.20.3.1.src.rpm
systemd-234-lp150.20.3.1.x86_64.rpm
systemd-bash-completion-234-lp150.20.3.1.noarch.rpm
systemd-container-234-lp150.20.3.1.x86_64.rpm
systemd-container-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-coredump-234-lp150.20.3.1.x86_64.rpm
systemd-coredump-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-debugsource-234-lp150.20.3.1.x86_64.rpm
systemd-devel-234-lp150.20.3.1.x86_64.rpm
systemd-logger-234-lp150.20.3.1.x86_64.rpm
systemd-sysvinit-234-lp150.20.3.1.x86_64.rpm
udev-234-lp150.20.3.1.x86_64.rpm
udev-debuginfo-234-lp150.20.3.1.x86_64.rpm
libsystemd0-mini-234-lp150.20.3.1.i586.rpm
libsystemd0-mini-debuginfo-234-lp150.20.3.1.i586.rpm
libudev-mini-devel-234-lp150.20.3.1.i586.rpm
libudev-mini1-234-lp150.20.3.1.i586.rpm
libudev-mini1-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-mini-234-lp150.20.3.1.i586.rpm
systemd-mini-container-mini-234-lp150.20.3.1.i586.rpm
systemd-mini-container-mini-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-mini-coredump-mini-234-lp150.20.3.1.i586.rpm
systemd-mini-coredump-mini-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-mini-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-mini-debugsource-234-lp150.20.3.1.i586.rpm
systemd-mini-devel-234-lp150.20.3.1.i586.rpm
systemd-mini-sysvinit-234-lp150.20.3.1.i586.rpm
udev-mini-234-lp150.20.3.1.i586.rpm
udev-mini-debuginfo-234-lp150.20.3.1.i586.rpm
libsystemd0-234-lp150.20.3.1.i586.rpm
libsystemd0-32bit-234-lp150.20.3.1.x86_64.rpm
libsystemd0-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
libsystemd0-debuginfo-234-lp150.20.3.1.i586.rpm
libudev-devel-234-lp150.20.3.1.i586.rpm
libudev-devel-32bit-234-lp150.20.3.1.x86_64.rpm
libudev1-234-lp150.20.3.1.i586.rpm
libudev1-32bit-234-lp150.20.3.1.x86_64.rpm
libudev1-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
libudev1-debuginfo-234-lp150.20.3.1.i586.rpm
nss-myhostname-234-lp150.20.3.1.i586.rpm
nss-myhostname-32bit-234-lp150.20.3.1.x86_64.rpm
nss-myhostname-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-myhostname-debuginfo-234-lp150.20.3.1.i586.rpm
nss-mymachines-234-lp150.20.3.1.i586.rpm
nss-mymachines-32bit-234-lp150.20.3.1.x86_64.rpm
nss-mymachines-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
nss-mymachines-debuginfo-234-lp150.20.3.1.i586.rpm
nss-systemd-234-lp150.20.3.1.i586.rpm
nss-systemd-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-234-lp150.20.3.1.i586.rpm
systemd-32bit-234-lp150.20.3.1.x86_64.rpm
systemd-32bit-debuginfo-234-lp150.20.3.1.x86_64.rpm
systemd-container-234-lp150.20.3.1.i586.rpm
systemd-container-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-coredump-234-lp150.20.3.1.i586.rpm
systemd-coredump-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-debuginfo-234-lp150.20.3.1.i586.rpm
systemd-debugsource-234-lp150.20.3.1.i586.rpm
systemd-devel-234-lp150.20.3.1.i586.rpm
systemd-logger-234-lp150.20.3.1.i586.rpm
systemd-sysvinit-234-lp150.20.3.1.i586.rpm
udev-234-lp150.20.3.1.i586.rpm
udev-debuginfo-234-lp150.20.3.1.i586.rpm
openSUSE-2018-625
Recommended update for yast2-dns-server
moderate
openSUSE Leap 15.0 Update
This update for yast2-dns-server fixes the following issues:
- YaST DNS would reload named.service even when it was not running, resulting in an error (boo#1093029)
yast2-dns-server-4.0.2-lp150.2.3.1.noarch.rpm
yast2-dns-server-4.0.2-lp150.2.3.1.src.rpm
openSUSE-2018-626
Recommended update for yast2-installation
moderate
openSUSE Leap 15.0 Update
This update for yast2-installation fixes the following issues:
- Possible crash when multipath is not available (boo#1095323)
- On s390 important devices may be blocked when cio_ignore is active (boo#1095033)
- AutoYaST re-installation mode detection did not work correctly on DASK disks (boo#1089547)
yast2-installation-4.0.63-lp150.2.6.1.noarch.rpm
yast2-installation-4.0.63-lp150.2.6.1.src.rpm