openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10254-1
Rating: important
References:
Cross-References: CVE-2022-4262 CVE-2022-4436 CVE-2022-4437
CVE-2022-4438 CVE-2022-4439 CVE-2022-4440
CVSS scores:
CVE-2022-4262 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-4436 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-4437 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-4438 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-4439 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-4440 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.4:NonFree
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for opera fixes the following issues:
- Update to 94.0.4606.38
- CHR-9133 Update chromium on desktop-stable-108-4606 to 108.0.5359.125
- DNA-103624 Create JS API to open Search tabs feature
- DNA-104004 Improve welcome pop-up
- DNA-104053 Right mouse click open speed dial instead of context menu
- DNA-104055 News article opens in active tab
- DNA-104084 [Suggestion] Introduce a way to remove the Lucid Mode button
- DNA-104089 No crashes reported in soccoro for Linux
- The update to chromium 108.0.5359.125 fixes following issues:
CVE-2022-4436, CVE-2022-4437, CVE-2022-4438, CVE-2022-4439, CVE-2022-4440
- Update to 94.0.4606.26
- CHR-9125 Update chromium on desktop-stable-108-4606 to 108.0.5359.99
- DNA-99207 WebUI popup/dropdown could be empty due to lack
of memory
- DNA-102882 [SD][News][Continue on][Suggestion] Do not focus
on opened page when opening in new tab
- DNA-103076 Release installer consent flow globally
- DNA-103137 Fix positioning in Web UI component
- DNA-103240 Re-use logic from popup for consent not set in settings
- DNA-103540 Implement Autostart for Opera Desktop (except Poland)
- DNA-103636 Implement Lucid Mode for Videos
- DNA-103637 Implement Lucid Mode button on top of videos
- DNA-103638 Make Lucid Mode button on top of videos work
- DNA-103641 Implement Lucid Mode for Images
- DNA-103642 Updated design and animation for Lucid Mode button
on top of videos
- DNA-103650 Add Lucid Mode to Easy Setup
- DNA-103701 Move User Styles loading/saving to a separate component
- DNA-103718 Record "consent_given" stat for every session
- DNA-103724 Video detach button wont go away
- DNA-103757 Add click animation for Lucid Mode button on top of videos
- DNA-103765 Console error with lucid mode flag off
- DNA-103770 Easy Setup switch doesn't get updated
- DNA-103771 Click animation should only show when turning
on Lucid Mode
- DNA-103773 Unable to access lucid mode settings section directly
- DNA-103784 Investigate video buttons 'escaping'
- DNA-103800 Adapt Lucid Mode button to new design
- DNA-103836 Translations for O94
- DNA-103850 Label on detach button cut off
- DNA-103924 Popup windows of type TYPE_APP_POPUP have incorrectly set
minimum size
- DNA-103931 Wrong sidebar detection.
- DNA-103935 Change Lucid Mode Video (Sharpen videos) to default off
- DNA-103949 Lucid Mode doesn't work in a private window
- DNA-103959 Unable to scroll down on player home page
- DNA-103962 [Settings] Remove "Safety Check"
- DNA-104011 Turn on Lucid Mode on all streams
- DNA-104052 Hide Lucid Mode video button on Google Meet
- DNA-103930 Promote O94 to stable
- The update to chromium 108.0.5359.99 fixes following issues:
CVE-2022-4262
- Update to 93.0.4585.64
- DNA-102836 Make 1st screen of Consent Popup a little taller to have
more space under "You can adjust your choices" label
- DNA-102934 Turn on building testlist on GOTH instead of Buildbot
- DNA-102969 On some pages search popup don't work
- DNA-103053 Put consent flow settings in separate feature flag
- DNA-103054 Update consent settings to new design
- DNA-103062 Add opauto tests for consent flow settings
- DNA-103099 Set testlist_from in testlist generating script
- DNA-103240 Re-use logic from popup for consent not set in settings
- DNA-103296 Force dark page break QR code in whats app
- DNA-103298 Stat for recording adblock whitelist is not sent in every
session
- DNA-103522 Missing translations for
IDS_CONSENT_FLOW_DATA_DESC_INTERESTS
- DNA-103526 search popup doesn't recognize some currencies shortcut
- DNA-103530 Replace icons in sidebar setup
- DNA-103636 Implement Lucid Mode for Videos
- DNA-103637 Implement Lucid Mode button on top of videos
- DNA-103638 Make Lucid Mode button on top of videos work
- DNA-103641 Implement Lucid Mode for Images
- DNA-103642 Updated design and animation for Lucid Mode button
on top of videos
- DNA-103650 Add Lucid Mode to Easy Setup
- DNA-103701 Move User Styles loading/saving to a separate component
- DNA-103718 Record "consent_given" stat for every session
- DNA-103724 Video detach button wont go away
- DNA-103757 Add click animation for Lucid Mode button on top of videos
- DNA-103765 Console error with lucid mode flag off
- DNA-103770 Easy Setup switch doesn't get updated
- DNA-103771 Click animation should only show when turning on Lucid Mode
- DNA-103773 Unable to access lucid mode settings section directly
- DNA-103784 Investigate video buttons 'escaping'
- DNA-103800 Adapt Lucid Mode button to new design
- DNA-103850 Label on detach button cut off
- DNA-103924 Popup windows of type TYPE_APP_POPUP have incorrectly set
minimum size
- DNA-103935 Change Lucid Mode Video (Sharpen videos) to default off
- DNA-104011 Turn on Lucid Mode on all streams
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:NonFree:
zypper in -t patch openSUSE-2022-10254=1
Package List:
- openSUSE Leap 15.4:NonFree (x86_64):
opera-94.0.4606.38-lp154.2.35.1
References:
https://www.suse.com/security/cve/CVE-2022-4262.htmlhttps://www.suse.com/security/cve/CVE-2022-4436.htmlhttps://www.suse.com/security/cve/CVE-2022-4437.htmlhttps://www.suse.com/security/cve/CVE-2022-4438.htmlhttps://www.suse.com/security/cve/CVE-2022-4439.htmlhttps://www.suse.com/security/cve/CVE-2022-4440.html
openSUSE Security Update: Security update for vlc
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10255-1
Rating: important
References: #1200944 #1206142
Cross-References: CVE-2022-41325
CVSS scores:
CVE-2022-41325 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for vlc fixes the following issues:
- Update to version 3.0.18 (CVE-2022-41325, boo#1206142):
+ macOS: Fix audio device listing with non-latin names.
+ Misc: Fix rendering and performance issue with older GPUs.
+ Updated translations.
- Changes from version 3.0.18-rc2:
+ Codec/Demux:
- Add support for Y16 chroma.
- Fix build of gme plugin.
+ Lua:
- Fix script for vocaroo.
- Fix script for youtube to allow throttled playback.
+ Service Discovery: Fix UPnP regression on Windows.
+ Video Output: Fix video placement with caopengllayer.
+ Misc: Fix password search in kwallet module.
- Changes from version 3.0.18-rc:
+ Demux:
- Major adaptive streaming update, notably for multiple timelies and
webvtt.
- Fix seeking with some fragmented MP4 files.
- Add support for DVBSub inside MKV.
- Fix some Flac files that could not be played.
- Improve seeking in Ogg files.
+ Decoders:
- Fix DxVA/D3D11 crashes on HEVC files with bogus references.
- Fix libass storage size and crash.
- Fix decoding errors on macOS hw decoding on some HEVC files.
+ Video Output:
- Fix color regression with VAAPI/iOS and OpenGL output.
- Fix some resizing issues with OpenGL on GLX/EGL/X11/XV.
- Fix Direct3d9 texture stretching.
- Fix 10-bit accelerated video filters on macOS.
+ Playlist: Avoid playlist liveloop on failed/tiny items (temporize EOS
bursts).
+ Misc:
- Misc fixes for the extension UI on macOS.
- Improve SMBv1 and SMBv2 behaviours.
- Improve FTP compatibility.
- Support RISC-V.
- Fix AVI muxing for Windows Media Player compatibility.
- Fix seeking speed on macOS.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2022-10255=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 ppc64le x86_64):
libvlc5-3.0.18-bp154.2.3.1
libvlccore9-3.0.18-bp154.2.3.1
vlc-3.0.18-bp154.2.3.1
vlc-codec-gstreamer-3.0.18-bp154.2.3.1
vlc-devel-3.0.18-bp154.2.3.1
vlc-jack-3.0.18-bp154.2.3.1
vlc-noX-3.0.18-bp154.2.3.1
vlc-opencv-3.0.18-bp154.2.3.1
vlc-qt-3.0.18-bp154.2.3.1
vlc-vdpau-3.0.18-bp154.2.3.1
- openSUSE Backports SLE-15-SP4 (noarch):
vlc-lang-3.0.18-bp154.2.3.1
References:
https://www.suse.com/security/cve/CVE-2022-41325.htmlhttps://bugzilla.suse.com/1200944https://bugzilla.suse.com/1206142
SUSE Security Update: Security update for polkit-default-privs
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:4639-1
Rating: low
References: #1206414
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for polkit-default-privs fixes the following issues:
Update to version 13.2+20221216.a0c29e6:
- backport usbguard actions (bsc#1206414).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-4639=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-4639=1
Package List:
- openSUSE Leap 15.4 (noarch):
polkit-default-privs-13.2+20221216.a0c29e6-150400.3.3.1
polkit-whitelisting-13.2+20221216.a0c29e6-150400.3.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
polkit-default-privs-13.2+20221216.a0c29e6-150400.3.3.1
References:
https://bugzilla.suse.com/1206414
SUSE Security Update: Security update for MozillaThunderbird
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:4636-1
Rating: moderate
References: #1206653
Cross-References: CVE-2022-46874
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Linux Enterprise Workstation Extension 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for MozillaThunderbird fixes the following issues:
Update to version 102.6.1
* fixed: Remote content did not load in user-defined signatures
* fixed: Addons that added new action buttons were not shown for addon
upgrades, requiring removal and reinstall
* fixed: Various stability improvements
* CVE-2022-46874: Drag and Dropped Filenames could have been truncated to
malicious extensions (bsc#1206653)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-4636=1
- SUSE Linux Enterprise Workstation Extension 15-SP4:
zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2022-4636=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-4636=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
MozillaThunderbird-102.6.1-150200.8.99.1
MozillaThunderbird-debuginfo-102.6.1-150200.8.99.1
MozillaThunderbird-debugsource-102.6.1-150200.8.99.1
MozillaThunderbird-translations-common-102.6.1-150200.8.99.1
MozillaThunderbird-translations-other-102.6.1-150200.8.99.1
- SUSE Linux Enterprise Workstation Extension 15-SP4 (x86_64):
MozillaThunderbird-102.6.1-150200.8.99.1
MozillaThunderbird-debuginfo-102.6.1-150200.8.99.1
MozillaThunderbird-debugsource-102.6.1-150200.8.99.1
MozillaThunderbird-translations-common-102.6.1-150200.8.99.1
MozillaThunderbird-translations-other-102.6.1-150200.8.99.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (aarch64 ppc64le s390x):
MozillaThunderbird-102.6.1-150200.8.99.1
MozillaThunderbird-debuginfo-102.6.1-150200.8.99.1
MozillaThunderbird-debugsource-102.6.1-150200.8.99.1
MozillaThunderbird-translations-common-102.6.1-150200.8.99.1
MozillaThunderbird-translations-other-102.6.1-150200.8.99.1
References:
https://www.suse.com/security/cve/CVE-2022-46874.htmlhttps://bugzilla.suse.com/1206653
SUSE Security Update: Security update for conmon
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:4635-1
Rating: moderate
References: #1200285
Cross-References: CVE-2022-1708
CVSS scores:
CVE-2022-1708 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-1708 (SUSE): 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Containers 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for conmon fixes the following issues:
conmon was updated to version 2.1.5:
* don't leak syslog_identifier
* logging: do not read more that the buf size
* logging: fix error handling
* Makefile: Fix install for FreeBSD
* signal: Track changes to get_signal_descriptor in the FreeBSD version
* Packit: initial enablement
Update to version 2.1.4:
* Fix a bug where conmon crashed when it got a SIGCHLD
update to 2.1.3:
* Stop using g_unix_signal_add() to avoid threads
* Rename CLI optionlog-size-global-max to log-global-size-max
Update to version 2.1.2:
* add log-global-size-max option to limit the total output conmon
processes (CVE-2022-1708 bsc#1200285)
* journald: print tag and name if both are specified
* drop some logs to debug level
Update to version 2.1.0
* logging: buffer partial messages to journald
* exit: close all fds >= 3
* fix: cgroup: Free memory_cgroup_file_path if open fails.
Update to version 2.0.32
* Fix: Avoid mainfd_std{in,out} sharing the same file descriptor.
* exit_command: Fix: unset subreaper attribute before running exit command
Update to version 2.0.31
* logging: new mode -l passthrough
* ctr_logs: use container name or ID as SYSLOG_IDENTIFIER for journald
* conmon: Fix: free userdata files before exec cleanup
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.3:
zypper in -t patch openSUSE-Leap-Micro-5.3-2022-4635=1
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-4635=1
- SUSE Linux Enterprise Module for Containers 15-SP4:
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2022-4635=1
- SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2022-4635=1
Package List:
- openSUSE Leap Micro 5.3 (aarch64 x86_64):
conmon-2.1.5-150400.3.3.1
conmon-debuginfo-2.1.5-150400.3.3.1
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
conmon-2.1.5-150400.3.3.1
conmon-debuginfo-2.1.5-150400.3.3.1
- SUSE Linux Enterprise Module for Containers 15-SP4 (aarch64 ppc64le s390x x86_64):
conmon-2.1.5-150400.3.3.1
conmon-debuginfo-2.1.5-150400.3.3.1
- SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):
conmon-2.1.5-150400.3.3.1
conmon-debuginfo-2.1.5-150400.3.3.1
References:
https://www.suse.com/security/cve/CVE-2022-1708.htmlhttps://bugzilla.suse.com/1200285