openSUSE Recommended Update: Recommended update for python-scipy
______________________________________________________________________________
Announcement ID: openSUSE-RU-2019:2216-1
Rating: moderate
References: #1149203
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update brings python-scipy to version 1.2.2 (jsc#SLE-8532,
bsc#1149203). All relevant changes are availalbe online in the following
places:
- https://docs.scipy.org/doc/scipy/reference/release.1.1.0.html
- https://docs.scipy.org/doc/scipy/reference/release.1.2.0.html
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-2216=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
python-scipy-debuginfo-1.2.2-lp150.2.3.2
python-scipy-debugsource-1.2.2-lp150.2.3.2
python2-scipy-1.2.2-lp150.2.3.2
python2-scipy-debuginfo-1.2.2-lp150.2.3.2
python3-scipy-1.2.2-lp150.2.3.2
python3-scipy-debuginfo-1.2.2-lp150.2.3.2
References:
https://bugzilla.suse.com/1149203
openSUSE Recommended Update: Recommended update for pacemaker
______________________________________________________________________________
Announcement ID: openSUSE-RU-2019:2214-1
Rating: moderate
References: #1032511 #1127716 #1130122 #1131353 #1131356
#1133866 #1136712
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that has 7 recommended fixes can now be installed.
Description:
This update for pacemaker fixes the following issues:
- scheduler: Wait for probe actions to complete preventing unnecessary
restart/re-promote of dependent resources. (bsc#1130122, bsc#1032511)
- controller: Confirm cancel of failed monitors. (bsc#1133866)
- controller: Improve failed recurring action messages in the logs and
improve SAPHanaSR transition efficiency. (bsc#1133866)
- libcrmcommon: Return error when applying XML diffs containing unknown
operations. (bsc#1127716)
- libcrmcommon: Avoid possible use of NULL when applying XML diffs and
apply them correctly with multiple move/create changes. (bsc#1127716)
- libcrmcommon: Return proper code if testing PID is denied and avoid NULL
by returning active process ID. (bsc#1131353, bsc#1131356)
- contoller,scheduler: Guarding hash table of deleting. (bsc#1136712)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-2214=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
libpacemaker-devel-1.1.18+20180430.b12c320f5-lp150.2.12.1
libpacemaker3-1.1.18+20180430.b12c320f5-lp150.2.12.1
libpacemaker3-debuginfo-1.1.18+20180430.b12c320f5-lp150.2.12.1
pacemaker-1.1.18+20180430.b12c320f5-lp150.2.12.1
pacemaker-cli-1.1.18+20180430.b12c320f5-lp150.2.12.1
pacemaker-cli-debuginfo-1.1.18+20180430.b12c320f5-lp150.2.12.1
pacemaker-debuginfo-1.1.18+20180430.b12c320f5-lp150.2.12.1
pacemaker-debugsource-1.1.18+20180430.b12c320f5-lp150.2.12.1
pacemaker-remote-1.1.18+20180430.b12c320f5-lp150.2.12.1
pacemaker-remote-debuginfo-1.1.18+20180430.b12c320f5-lp150.2.12.1
- openSUSE Leap 15.0 (noarch):
pacemaker-cts-1.1.18+20180430.b12c320f5-lp150.2.12.1
References:
https://bugzilla.suse.com/1032511https://bugzilla.suse.com/1127716https://bugzilla.suse.com/1130122https://bugzilla.suse.com/1131353https://bugzilla.suse.com/1131356https://bugzilla.suse.com/1133866https://bugzilla.suse.com/1136712
openSUSE Recommended Update: Recommended update for libcdio
______________________________________________________________________________
Announcement ID: openSUSE-RU-2019:2215-1
Rating: moderate
References: #1094761
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for libcdio fixes the following issues:
- Fix warning when BigEndian and LittleEndian sizes do not match.
(bsc#1094761)
- Fix that libcdio doesn't bail out when processing non-compliant ISO
files.
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-2215=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
libcdio++0-0.94-lp150.5.10.1
libcdio++0-debuginfo-0.94-lp150.5.10.1
libcdio-debugsource-0.94-lp150.5.10.1
libcdio-devel-0.94-lp150.5.10.1
libcdio16-0.94-lp150.5.10.1
libcdio16-debuginfo-0.94-lp150.5.10.1
libiso9660-10-0.94-lp150.5.10.1
libiso9660-10-debuginfo-0.94-lp150.5.10.1
libudf0-0.94-lp150.5.10.1
libudf0-debuginfo-0.94-lp150.5.10.1
- openSUSE Leap 15.0 (x86_64):
libcdio++0-32bit-0.94-lp150.5.10.1
libcdio++0-32bit-debuginfo-0.94-lp150.5.10.1
libcdio16-32bit-0.94-lp150.5.10.1
libcdio16-32bit-debuginfo-0.94-lp150.5.10.1
libiso9660-10-32bit-0.94-lp150.5.10.1
libiso9660-10-32bit-debuginfo-0.94-lp150.5.10.1
libudf0-32bit-0.94-lp150.5.10.1
libudf0-32bit-debuginfo-0.94-lp150.5.10.1
References:
https://bugzilla.suse.com/1094761
openSUSE Security Update: Security update for libopenmpt
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:2212-1
Rating: moderate
References: #1143578 #1143581 #1143582 #1143584
Cross-References: CVE-2018-20860 CVE-2018-20861 CVE-2019-14382
CVE-2019-14383
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for libopenmpt fixes the following issues:
Security issues fixed:
- CVE-2018-20861: Fixed crash with certain malformed custom tunings in
MPTM files (bsc#1143578).
- CVE-2018-20860: Fixed crash with malformed MED files (bsc#1143581).
- CVE-2019-14383: Fixed J2B that allows an assertion failure during file
parsing with debug STLs (bsc#1143584).
- CVE-2019-14382: Fixed DSM that allows an assertion failure during file
parsing with debug STLs (bsc#1143582).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-2212=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
libmodplug-devel-0.3.17-lp150.7.1
libmodplug1-0.3.17-lp150.7.1
libmodplug1-debuginfo-0.3.17-lp150.7.1
libopenmpt-debugsource-0.3.17-lp150.7.1
libopenmpt-devel-0.3.17-lp150.7.1
libopenmpt0-0.3.17-lp150.7.1
libopenmpt0-debuginfo-0.3.17-lp150.7.1
libopenmpt_modplug1-0.3.17-lp150.7.1
libopenmpt_modplug1-debuginfo-0.3.17-lp150.7.1
openmpt123-0.3.17-lp150.7.1
openmpt123-debuginfo-0.3.17-lp150.7.1
- openSUSE Leap 15.0 (x86_64):
libmodplug1-32bit-0.3.17-lp150.7.1
libmodplug1-32bit-debuginfo-0.3.17-lp150.7.1
libopenmpt0-32bit-0.3.17-lp150.7.1
libopenmpt0-32bit-debuginfo-0.3.17-lp150.7.1
libopenmpt_modplug1-32bit-0.3.17-lp150.7.1
libopenmpt_modplug1-32bit-debuginfo-0.3.17-lp150.7.1
References:
https://www.suse.com/security/cve/CVE-2018-20860.htmlhttps://www.suse.com/security/cve/CVE-2018-20861.htmlhttps://www.suse.com/security/cve/CVE-2019-14382.htmlhttps://www.suse.com/security/cve/CVE-2019-14383.htmlhttps://bugzilla.suse.com/1143578https://bugzilla.suse.com/1143581https://bugzilla.suse.com/1143582https://bugzilla.suse.com/1143584
openSUSE Security Update: Security update for libopenmpt
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:2213-1
Rating: moderate
References: #1143578 #1143581 #1143582 #1143584
Cross-References: CVE-2018-20860 CVE-2018-20861 CVE-2019-14382
CVE-2019-14383
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for libopenmpt fixes the following issues:
Security issues fixed:
- CVE-2018-20861: Fixed crash with certain malformed custom tunings in
MPTM files (bsc#1143578).
- CVE-2018-20860: Fixed crash with malformed MED files (bsc#1143581).
- CVE-2019-14383: Fixed J2B that allows an assertion failure during file
parsing with debug STLs (bsc#1143584).
- CVE-2019-14382: Fixed DSM that allows an assertion failure during file
parsing with debug STLs (bsc#1143582).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-2213=1
Package List:
- openSUSE Leap 15.1 (i586 x86_64):
libmodplug-devel-0.3.17-lp151.2.3.1
libmodplug1-0.3.17-lp151.2.3.1
libmodplug1-debuginfo-0.3.17-lp151.2.3.1
libopenmpt-debugsource-0.3.17-lp151.2.3.1
libopenmpt-devel-0.3.17-lp151.2.3.1
libopenmpt0-0.3.17-lp151.2.3.1
libopenmpt0-debuginfo-0.3.17-lp151.2.3.1
libopenmpt_modplug1-0.3.17-lp151.2.3.1
libopenmpt_modplug1-debuginfo-0.3.17-lp151.2.3.1
openmpt123-0.3.17-lp151.2.3.1
openmpt123-debuginfo-0.3.17-lp151.2.3.1
- openSUSE Leap 15.1 (x86_64):
libmodplug1-32bit-0.3.17-lp151.2.3.1
libmodplug1-32bit-debuginfo-0.3.17-lp151.2.3.1
libopenmpt0-32bit-0.3.17-lp151.2.3.1
libopenmpt0-32bit-debuginfo-0.3.17-lp151.2.3.1
libopenmpt_modplug1-32bit-0.3.17-lp151.2.3.1
libopenmpt_modplug1-32bit-debuginfo-0.3.17-lp151.2.3.1
References:
https://www.suse.com/security/cve/CVE-2018-20860.htmlhttps://www.suse.com/security/cve/CVE-2018-20861.htmlhttps://www.suse.com/security/cve/CVE-2019-14382.htmlhttps://www.suse.com/security/cve/CVE-2019-14383.htmlhttps://bugzilla.suse.com/1143578https://bugzilla.suse.com/1143581https://bugzilla.suse.com/1143582https://bugzilla.suse.com/1143584
openSUSE Security Update: Security update for expat
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:2205-1
Rating: moderate
References: #1149429
Cross-References: CVE-2019-15903
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for expat fixes the following issues:
Security issues fixed:
- CVE-2019-15903: Fixed heap-based buffer over-read caused by crafted XML
input. (bsc#1149429)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2019-2205=1
Package List:
- openSUSE Leap 15.1 (i586 x86_64):
expat-2.2.5-lp151.3.6.1
expat-debuginfo-2.2.5-lp151.3.6.1
expat-debugsource-2.2.5-lp151.3.6.1
libexpat-devel-2.2.5-lp151.3.6.1
libexpat1-2.2.5-lp151.3.6.1
libexpat1-debuginfo-2.2.5-lp151.3.6.1
- openSUSE Leap 15.1 (x86_64):
expat-32bit-debuginfo-2.2.5-lp151.3.6.1
libexpat-devel-32bit-2.2.5-lp151.3.6.1
libexpat1-32bit-2.2.5-lp151.3.6.1
libexpat1-32bit-debuginfo-2.2.5-lp151.3.6.1
References:
https://www.suse.com/security/cve/CVE-2019-15903.htmlhttps://bugzilla.suse.com/1149429
openSUSE Security Update: Security update for expat
______________________________________________________________________________
Announcement ID: openSUSE-SU-2019:2204-1
Rating: moderate
References: #1149429
Cross-References: CVE-2019-15903
Affected Products:
openSUSE Leap 15.0
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for expat fixes the following issues:
Security issues fixed:
- CVE-2019-15903: Fixed heap-based buffer over-read caused by crafted XML
input. (bsc#1149429)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2019-2204=1
Package List:
- openSUSE Leap 15.0 (i586 x86_64):
expat-2.2.5-lp150.2.6.1
expat-debuginfo-2.2.5-lp150.2.6.1
expat-debugsource-2.2.5-lp150.2.6.1
libexpat-devel-2.2.5-lp150.2.6.1
libexpat1-2.2.5-lp150.2.6.1
libexpat1-debuginfo-2.2.5-lp150.2.6.1
- openSUSE Leap 15.0 (x86_64):
expat-32bit-debuginfo-2.2.5-lp150.2.6.1
libexpat-devel-32bit-2.2.5-lp150.2.6.1
libexpat1-32bit-2.2.5-lp150.2.6.1
libexpat1-32bit-debuginfo-2.2.5-lp150.2.6.1
References:
https://www.suse.com/security/cve/CVE-2019-15903.htmlhttps://bugzilla.suse.com/1149429