openSUSE: 2020:0436-1: moderate: python-nltk

    Date 31 Mar 2020
    Posted By LinuxSecurity Advisories
    An update that fixes one vulnerability is now available.
       openSUSE Security Update: Security update for python-nltk
    Announcement ID:    openSUSE-SU-2020:0436-1
    Rating:             moderate
    References:         #1146427 
    Cross-References:   CVE-2019-14751
    Affected Products:
                        openSUSE Leap 15.1
       An update that fixes one vulnerability is now available.
       This update for python-nltk fixes the following issues:
       Update to 3.4.5 (boo#1146427, CVE-2019-14751):
       * CVE-2019-14751: Fixed Zip slip vulnerability in downloader for the
         unlikely situation where a user configures their downloader to use a
         compromised server (boo#1146427)
       Update to 3.4.4:
       * fix bug in plot function (
       * add improved PanLex Swadesh corpus reader
       * add Text.generate()
       * add QuadgramAssocMeasures
       * add SSP to tokenizers
       * return confidence of best tag from AveragedPerceptron
       * make plot methods return Axes objects
       * don't require list arguments to PositiveNaiveBayesClassifier.train
       * fix Tree classes to work with native Python copy library
       * fix inconsistency for NomBank
       * fix random seeding in LanguageModel.generate
       * fix ConditionalFreqDist mutation on tabulate/plot call
       * fix broken links in documentation
       * fix misc Wordnet issues
       * update installation instructions
       Version update to 3.4.1:
       * add chomsky_normal_form for CFGs
       * add meteor score
       * add minimum edit/Levenshtein distance based alignment function
       * allow access to collocation list via text.collocation_list()
       * support corenlp server options
       * drop support for Python 3.4
       * other minor fixes
       Update to v3.4:
       * Support Python 3.7
       * New Language Modeling package
       * Cistem Stemmer for German
       * Support Russian National Corpus incl POS tag model
       * Krippendorf Alpha inter-rater reliability test
       * Comprehensive code clean-ups
       * Switch continuous integration from Jenkins to Travis
       Updated to v3.3:
       * Support Python 3.6
       * New interface to CoreNLP
       * Support synset retrieval by sense key
       * Minor fixes to CoNLL Corpus Reader
       * AlignedSent
       * Fixed minor inconsistencies in APIs and API documentation
       * Better conformance to PEP8
       * Drop Moses Tokenizer (incompatible license)
    Patch Instructions:
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
       Alternatively you can run the command listed for your product:
       - openSUSE Leap 15.1:
          zypper in -t patch openSUSE-2020-436=1
    Package List:
       - openSUSE Leap 15.1 (noarch):

    LinuxSecurity Poll

    Do you agree with Linus Torvalds' decision to reject the controversial patch mitigating the Snoop attack on Intel CPUs?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"100","title":"Yes - this was undoubtedly the right decision.","votes":"1","type":"x","order":"1","pct":50,"resources":[]},{"id":"101","title":"Not sure...","votes":"1","type":"x","order":"2","pct":50,"resources":[]},{"id":"102","title":"No - he made a big mistake here.","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200


    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.