openSUSE Updates
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
April 2022
- 2 participants
- 136 discussions
SUSE-SU-2022:1164-1: important: Security update for go1.16
by opensuse-security@opensuse.org 12 Apr '22
by opensuse-security@opensuse.org 12 Apr '22
12 Apr '22
SUSE Security Update: Security update for go1.16
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1164-1
Rating: important
References: #1182345 #1183043 #1196732
Cross-References: CVE-2022-24921
CVSS scores:
CVE-2022-24921 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-24921 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Realtime Extension 15-SP2
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update for go1.16 fixes the following issues:
Update to version 1.16.15 (bsc#1182345):
- CVE-2022-24921: Fixed a potential denial of service via large regular
expressions (bsc#1196732).
Non-security fixes:
- Fixed an issue with v2 modules (go#51331).
- Fixed an issue when building source in riscv64 (go#51198).
- Increased compatibility for the DNS protocol in the net module
(go#51161).
- Fixed an issue with histograms in the runtime/metrics module
(go#50733).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1164=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1164=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1164=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1164=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1164=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1164=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1164=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1164=1
- SUSE Linux Enterprise Realtime Extension 15-SP2:
zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-1164=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-1164=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1164=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1164=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1164=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
- openSUSE Leap 15.4 (aarch64 x86_64):
go1.16-race-1.16.15-150000.1.46.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
- openSUSE Leap 15.3 (aarch64 x86_64):
go1.16-race-1.16.15-150000.1.46.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
- SUSE Manager Server 4.1 (x86_64):
go1.16-race-1.16.15-150000.1.46.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
go1.16-race-1.16.15-150000.1.46.1
- SUSE Manager Proxy 4.1 (x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
go1.16-race-1.16.15-150000.1.46.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64):
go1.16-race-1.16.15-150000.1.46.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 x86_64):
go1.16-race-1.16.15-150000.1.46.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
go1.16-race-1.16.15-150000.1.46.1
- SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
go1.16-race-1.16.15-150000.1.46.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64):
go1.16-race-1.16.15-150000.1.46.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
go1.16-race-1.16.15-150000.1.46.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
go1.16-race-1.16.15-150000.1.46.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
go1.16-1.16.15-150000.1.46.1
go1.16-doc-1.16.15-150000.1.46.1
go1.16-race-1.16.15-150000.1.46.1
References:
https://www.suse.com/security/cve/CVE-2022-24921.html
https://bugzilla.suse.com/1182345
https://bugzilla.suse.com/1183043
https://bugzilla.suse.com/1196732
1
0
SUSE-SU-2022:1157-1: important: Security update for libsolv, libzypp, zypper
by opensuse-security@opensuse.org 12 Apr '22
by opensuse-security@opensuse.org 12 Apr '22
12 Apr '22
SUSE Security Update: Security update for libsolv, libzypp, zypper
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1157-1
Rating: important
References: #1184501 #1194848 #1195999 #1196061 #1196317
#1196368 #1196514 #1196925 #1197134
Affected Products:
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP2
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP2
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Installer 15-SP2
SUSE Linux Enterprise Micro 5.0
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Realtime Extension 15-SP2
SUSE Linux Enterprise Server 15-SP2
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Storage 7
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for libsolv, libzypp, zypper fixes the following issues:
Security relevant fix:
- Harden package signature checks (bsc#1184501).
libsolv update to 0.7.22:
- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor
change
- support strict repository priorities new solver flag:
SOLVER_FLAG_STRICT_REPO_PRIORITY
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members ("requires"
is a keyword in C++20)
- support setting/reading userdata in solv files new functions:
repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function new function:
pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime
libzypp update to 17.30.0:
- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501) Pay attention that header and
payload are secured by a valid signature and report more detailed which
signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381) A previously
released ISO image may need a bit more time to release it's loop device.
So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm protocol
(bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf<>patch resolver conflicts (bsc#1194848)
zypper update to 1.14.52:
- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1157=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1157=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1157=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1157=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1157=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1157=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1157=1
- SUSE Linux Enterprise Realtime Extension 15-SP2:
zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-1157=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-1157=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1157=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1157=1
- SUSE Linux Enterprise Micro 5.0:
zypper in -t patch SUSE-SUSE-MicroOS-5.0-2022-1157=1
- SUSE Linux Enterprise Installer 15-SP2:
zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2022-1157=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1157=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1157=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1157=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-demo-0.7.22-150200.12.1
libsolv-demo-debuginfo-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
libzypp-devel-doc-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python-solv-0.7.22-150200.12.1
python-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- openSUSE Leap 15.3 (noarch):
zypper-aptitude-1.14.52-150200.30.2
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Manager Server 4.1 (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Manager Retail Branch Server 4.1 (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Manager Retail Branch Server 4.1 (x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Manager Proxy 4.1 (x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Manager Proxy 4.1 (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Linux Enterprise Server 15-SP2-BCL (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Linux Enterprise Realtime Extension 15-SP2 (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Linux Enterprise Micro 5.1 (noarch):
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Linux Enterprise Micro 5.0 (aarch64 x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Linux Enterprise Micro 5.0 (noarch):
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Linux Enterprise Installer 15-SP2 (aarch64 ppc64le s390x x86_64):
libsolv-tools-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
- SUSE Enterprise Storage 7 (aarch64 x86_64):
libsolv-debuginfo-0.7.22-150200.12.1
libsolv-debugsource-0.7.22-150200.12.1
libsolv-devel-0.7.22-150200.12.1
libsolv-devel-debuginfo-0.7.22-150200.12.1
libsolv-tools-0.7.22-150200.12.1
libsolv-tools-debuginfo-0.7.22-150200.12.1
libzypp-17.30.0-150200.36.1
libzypp-debuginfo-17.30.0-150200.36.1
libzypp-debugsource-17.30.0-150200.36.1
libzypp-devel-17.30.0-150200.36.1
perl-solv-0.7.22-150200.12.1
perl-solv-debuginfo-0.7.22-150200.12.1
python3-solv-0.7.22-150200.12.1
python3-solv-debuginfo-0.7.22-150200.12.1
ruby-solv-0.7.22-150200.12.1
ruby-solv-debuginfo-0.7.22-150200.12.1
zypper-1.14.52-150200.30.2
zypper-debuginfo-1.14.52-150200.30.2
zypper-debugsource-1.14.52-150200.30.2
- SUSE Enterprise Storage 7 (noarch):
zypper-log-1.14.52-150200.30.2
zypper-needs-restarting-1.14.52-150200.30.2
References:
https://bugzilla.suse.com/1184501
https://bugzilla.suse.com/1194848
https://bugzilla.suse.com/1195999
https://bugzilla.suse.com/1196061
https://bugzilla.suse.com/1196317
https://bugzilla.suse.com/1196368
https://bugzilla.suse.com/1196514
https://bugzilla.suse.com/1196925
https://bugzilla.suse.com/1197134
1
0
SUSE-SU-2022:1163-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 12 Apr '22
by opensuse-security@opensuse.org 12 Apr '22
12 Apr '22
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1163-1
Rating: important
References: #1065729 #1156395 #1175667 #1177028 #1178134
#1179639 #1180153 #1189562 #1194589 #1194625
#1194649 #1194943 #1195051 #1195353 #1195640
#1195926 #1196018 #1196130 #1196196 #1196478
#1196488 #1196761 #1196823 #1196956 #1197227
#1197243 #1197245 #1197300 #1197302 #1197331
#1197343 #1197366 #1197389 #1197460 #1197462
#1197501 #1197534 #1197661 #1197675 #1197677
#1197702 #1197811 #1197812 #1197815 #1197817
#1197819 #1197820 #1197888 #1197889 #1197894
#1198027 #1198028 #1198029 #1198030 #1198031
#1198032 #1198033 #1198077
Cross-References: CVE-2021-39698 CVE-2021-45402 CVE-2021-45868
CVE-2022-0850 CVE-2022-0854 CVE-2022-1011
CVE-2022-1016 CVE-2022-1048 CVE-2022-1055
CVE-2022-1195 CVE-2022-1198 CVE-2022-1199
CVE-2022-1205 CVE-2022-23036 CVE-2022-23037
CVE-2022-23038 CVE-2022-23039 CVE-2022-23040
CVE-2022-23041 CVE-2022-23042 CVE-2022-27223
CVE-2022-27666 CVE-2022-28388 CVE-2022-28389
CVE-2022-28390
CVSS scores:
CVE-2021-39698 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-39698 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-45402 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-45402 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
CVE-2021-45868 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-45868 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-0850 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
CVE-2022-0854 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2022-0854 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2022-1011 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-1011 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-1016 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2022-1048 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-1055 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-1055 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-1195 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-1198 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-1199 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-1205 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-23036 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-23036 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-23037 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-23037 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-23038 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-23038 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-23039 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-23039 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-23040 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-23040 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-23041 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-23041 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-23042 (NVD) : 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-23042 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-27223 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-27223 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2022-27666 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-27666 (SUSE): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVE-2022-28388 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-28388 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-28389 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-28389 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-28390 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-28390 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Public Cloud 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves 25 vulnerabilities and has 33 fixes
is now available.
Description:
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels
DMA subsystem. This flaw allowed a local user to read random memory from
the kernel space. (bnc#1196823)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the
netfilter subsystem. This vulnerability gives an attacker a powerful
primitive that can be used to both read from and write to relative stack
data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1199: Fixed null-ptr-deref and use-after-free vulnerabilities
that allow an attacker to crash the linux kernel by simulating Amateur
Radio. (bsc#1198028)
- CVE-2022-1205: Fixed null pointer dereference and use-after-free
vulnerabilities that allow an attacker to crash the linux kernel by
simulating Amateur Radio. (bsc#1198027)
- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an
attacker to crash the linux kernel by simulating Amateur Radio
(bsc#1198030).
- CVE-2022-1195: Fixed an use-after-free vulnerability which could allow a
local attacker with a user privilege to execute a denial of service.
(bsc#1198029)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c
vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c
vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c
vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to
use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock.
(bsc#1197331)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow
a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in
iov_iter.c. (bsc#1196761)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP
transformation code. This flaw allowed a local attacker with a normal
user privilege to overwrite kernel heap objects and may cause a local
privilege escalation. (bnc#1197462)
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c
which could lead to an use-after-free if there is a corrupted quota
file. (bnc#1197366)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a
local attacker to retireve (partial) /etc/shadow hashes or any other
data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)
- CVE-2022-27223: Fixed an out-of-array access in
/usb/gadget/udc/udc-xilinx.c. (bsc#1197245)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after
free in aio_poll_complete_work. This could lead to local escalation of
privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-45402: Fixed a pointer leak in check_alu_op() of
kernel/bpf/verifier.c. (bsc#1196130).
-
CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,
CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have
lead to read/write access to memory pages or denial of service. These
issues are related to the Xen PV device frontend drivers. (bsc#1196488)
The following non-security bugs were fixed:
- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board
(git-fixes).
- ACPI: APEI: fix return value of __setup handlers (git-fixes).
- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3
(git-fixes).
- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
(git-fixes).
- ACPI: docs: enumeration: Discourage to use custom _DSM methods
(git-fixes).
- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).
- ACPI: properties: Consistently return -ENOENT if there are no more
references (git-fixes).
- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU
(git-fixes).
- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).
- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
(git-fixes).
- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671
(git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).
- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).
- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec
(git-fixes).
- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).
- ALSA: spi: Add check for clk_enable() (git-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB
(git-fixes).
- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).
- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
(git-fixes).
- ASoC: codecs: wcd934x: Add missing of_node_put() in
wcd934x_codec_parse_data (git-fixes).
- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put
(git-fixes).
- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback
(git-fixes).
- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).
- ASoC: fsi: Add check for clk_enable (git-fixes).
- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).
- ASoC: imx-es8328: Fix error return code in imx_es8328_probe()
(git-fixes).
- ASoC: msm8916-wcd-analog: Fix error handling in
pm8916_wcd_analog_spmi_probe (git-fixes).
- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in
msm8916_wcd_digital_probe (git-fixes).
- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).
- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).
- ASoC: rt5663: check the return value of devm_kzalloc() in
rt5663_parse_dp() (git-fixes).
- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).
- ASoC: SOF: topology: remove redundant code (git-fixes).
- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).
- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).
- ASoC: topology: Allow TLV control to be either read or write (git-fixes).
- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior
(git-fixes).
- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).
- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).
- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32
(bsc#1196018).
- block: update io_ticks when io hang (bsc#1197817).
- block/wbt: fix negative inflight counter when remove scsi device
(bsc#1197819).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).
- bpf: Remove config check to enable bpf support for branch records
(git-fixes bsc#1177028).
- btrfs: avoid unnecessary lock and leaf splits when updating inode in the
log (bsc#1194649).
- btrfs: avoid unnecessary log mutex contention when syncing log
(bsc#1194649).
- btrfs: avoid unnecessary logging of xattrs during fast fsyncs
(bsc#1194649).
- btrfs: check error value from btrfs_update_inode in tree log
(bsc#1194649).
- btrfs: check if a log root exists before locking the log_mutex on unlink
(bsc#1194649).
- btrfs: check if a log tree exists at inode_logged() (bsc#1194649).
- btrfs: do not commit delayed inode when logging a file in full sync mode
(bsc#1194649).
- btrfs: do not log new dentries when logging that a new name exists
(bsc#1194649).
- btrfs: eliminate some false positives when checking if inode was logged
(bsc#1194649).
- btrfs: fix race leading to unnecessary transaction commit when logging
inode (bsc#1194649).
- btrfs: fix race that causes unnecessary logging of ancestor inodes
(bsc#1194649).
- btrfs: fix race that makes inode logging fallback to transaction commit
(bsc#1194649).
- btrfs: fix race that results in logging old extents during a fast fsync
(bsc#1194649).
- btrfs: fixup error handling in fixup_inode_link_counts (bsc#1194649).
- btrfs: remove no longer needed full sync flag check at inode_logged()
(bsc#1194649).
- btrfs: Remove unnecessary check from join_running_log_trans
(bsc#1194649).
- btrfs: remove unnecessary directory inode item update when deleting dir
entry (bsc#1194649).
- btrfs: remove unnecessary list head initialization when syncing log
(bsc#1194649).
- btrfs: skip unnecessary searches for xattrs when logging an inode
(bsc#1194649).
- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error
path (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error
path (git-fixes).
- can: mcba_usb: properly check endpoint type (git-fixes).
- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device
when fully ready (git-fixes).
- cifs: do not skip link targets when an I/O fails (bsc#1194625).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).
- clk: bcm2835: Remove unused variable (git-fixes).
- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).
- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).
- clk: Initialize orphan req_rate (git-fixes).
- clk: loongson1: Terminate clk_div_table with sentinel element
(git-fixes).
- clk: nxp: Remove unused variable (git-fixes).
- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).
- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).
- clk: tegra: tegra124-emc: Fix missing put_device() call in
emc_ensure_emc_driver (git-fixes).
- clk: uniphier: Fix fixed-rate initialization (git-fixes).
- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).
- clocksource/drivers/timer-of: Check return value of of_iomap in
timer_of_base_init() (git-fixes).
- cpufreq: schedutil: Destroy mutex before kobject_put() frees (git-fixes)
- crypto: authenc - Fix sleep in atomic context in decrypt_tail
(git-fixes).
- crypto: cavium/nitrox - do not cast parameter in bit operations
(git-fixes).
- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).
- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).
- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).
- crypto: qat - do not cast parameter in bit operations (git-fixes).
- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist
(git-fixes).
- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete()
(git-fixes).
- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).
- crypto: vmx - add missing dependencies (git-fixes).
- dma/pool: create dma atomic pool only if dma zone has managed pages
(bsc#1197501).
- driver core: dd: fix return value of __setup handler (git-fixes).
- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).
- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug
(git-fixes).
- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq
function (git-fixes).
- drm/bridge: dw-hdmi: use safe format when first in bridge chain
(git-fixes).
- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe
(git-fixes).
- drm/doc: overview before functions for drm_writeback.c (git-fixes).
- drm/i915: Fix dbuf slice config lookup (git-fixes).
- drm/i915/gem: add missing boundary check in vm_access (git-fixes).
- drm/imx: parallel-display: Remove bus flags check in
imx_pd_bridge_atomic_check() (git-fixes).
- drm/meson: Fix error handling when afbcd.ops->init fails (git-fixes).
- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops
(git-fixes).
- drm/msm/dpu: add DSPP blocks teardown (git-fixes).
- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl()
(git-fixes).
- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).
- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).
- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).
- drm/vc4: crtc: Make sure the HDMI controller is powered when disabling
(git-fixes).
- drm/vrr: Set VRR capable prop only if it is attached to connector
(git-fixes).
- Drop HID multitouch fix patch (bsc#1197243),
- ecryptfs: fix kernel panic with null dev_name (bsc#1197812).
- ecryptfs: Fix typo in message (bsc#1197811).
- EDAC: Fix calculation of returned address and next offset in
edac_align_ptr() (bsc#1178134).
- ext2: correct max file size computing (bsc#1197820).
- firmware: google: Properly state IOMEM dependency (git-fixes).
- firmware: qcom: scm: Remove reassignment to desc following initializer
(git-fixes).
- fscrypt: do not ignore minor_hash when hash is 0 (bsc#1197815).
- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).
- gpio: ts4900: Do not set DAT and OE together (git-fixes).
- gpiolib: acpi: Convert ACPI value of debounce to microseconds
(git-fixes).
- HID: multitouch: fix Dell Precision 7550 and 7750 button type
(bsc#1197243).
- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).
- hwmon: (pmbus) Add Vin unit off handling (git-fixes).
- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING
(git-fixes).
- hwrng: atmel - disable trng on failure path (git-fixes).
- i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes).
- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).
- iio: accel: mma8452: use the correct logic to get mma8452_data
(git-fixes).
- iio: adc: Add check for devm_request_threaded_irq (git-fixes).
- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).
- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).
- iio: inkern: apply consumer scale when no channel scale is available
(git-fixes).
- iio: inkern: make a best effort on offset calculation (git-fixes).
- Input: aiptek - properly check endpoint type (git-fixes).
- iwlwifi: do not advertise TWT support (git-fixes).
- kernel-binary.spec: Do not use the default certificate path
(bsc#1194943).
- KVM: SVM: Do not flush cache if hardware enforces cache coherency across
encryption domains (bsc#1178134).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- mac80211: fix potential double free on mesh join (git-fixes).
- mac80211: refuse aggregations sessions before authorized (git-fixes).
- media: aspeed: Correct value for h-total-pixels (git-fixes).
- media: bttv: fix WARNING regression on tunerless devices (git-fixes).
- media: coda: Fix missing put_device() call in coda_get_vdoa_data
(git-fixes).
- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).
- media: em28xx: initialize refcount before kref_get (git-fixes).
- media: hantro: Fix overfill bottom register field name (git-fixes).
- media: Revert "media: em28xx: add missing em28xx_close_extension"
(git-fixes).
- media: stk1160: If start stream fails, return buffers with
VB2_BUF_STATE_QUEUED (git-fixes).
- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).
- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).
- membarrier: Execute SYNC_CORE on the calling thread (git-fixes)
- membarrier: Explicitly sync remote cores when SYNC_CORE is (git-fixes)
- memory: emif: Add check for setup_interrupts (git-fixes).
- memory: emif: check the pointer temp in get_device_details() (git-fixes).
- misc: alcor_pci: Fix an error handling path (git-fixes).
- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).
- mm_zone: add function to check if managed dma zone exists (bsc#1197501).
- mm/page_alloc.c: do not warn allocation failure on zone DMA if no
managed pages (bsc#1197501).
- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).
- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).
- net: dsa: mv88e6xxx: override existent unicast portvec in port_fdb_add
(git-fixes).
- net: enetc: initialize the RFS and RSS memories (git-fixes).
- net: hns3: add a check for tqp_index in hclge_get_ring_chain_from_mbx()
(git-fixes).
- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).
- net: phy: DP83822: clear MISR2 register to disable interrupts
(git-fixes).
- net: phy: marvell: Fix invalid comparison in the resume and suspend
functions (git-fixes).
- net: stmmac: set TxQ mode back to DCB after disabling CBS (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
(bsc#1196018).
- net: watchdog: hold device global xmit lock during tx disable
(git-fixes).
- net/smc: Fix loop in smc_listen (git-fixes).
- net/smc: fix using of uninitialized completions (git-fixes).
- net/smc: fix wrong list_del in smc_lgr_cleanup_early (git-fixes).
- net/smc: Make sure the link_id is unique (git-fixes).
- net/smc: Reset conn->lgr when link group registration fails (git-fixes).
- netfilter: conntrack: do not refresh sctp entries in closed state
(bsc#1197389).
- netxen_nic: fix MSI/MSI-x interrupts (git-fixes).
- NFC: port100: fix use-after-free in port100_send_complete (git-fixes).
- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).
- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).
- NFS: Do not skip directory entries when doing uncached readdir
(git-fixes).
- NFS: Ensure the server had an up to date ctime before hardlinking
(git-fixes).
- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).
- NFS: LOOKUP_DIRECTORY is also ok with symlinks (git-fixes).
- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).
- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).
- nfsd: nfsd4_setclientid_confirm mistakenly expires confirmed client
(git-fixes).
- NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).
- NFSv4/pNFS: Fix another issue with a list iterator pointing to the head
(git-fixes).
- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init
(git-fixes).
- pinctrl: mediatek: paris: Fix "argument" argument type for
mtk_pinconf_get() (git-fixes).
- pinctrl: mediatek: paris: Fix pingroup pin config state readback
(git-fixes).
- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
(git-fixes).
- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).
- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE()
(git-fixes).
- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).
- pinctrl: samsung: drop pin banks references on error paths (git-fixes).
- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe
(git-fixes).
- PM: hibernate: fix __setup handler error handling (git-fixes).
- PM: suspend: fix return value of __setup handler (git-fixes).
- powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1156395).
- powerpc/mm: Fix verification of MMU_FTR_TYPE_44x (bsc#1156395).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties()
(bsc#1179639 ltc#189002 git-fixes).
- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).
- powerpc/perf: Expose Performance Monitor Counter SPR's as part of
extended regs (bsc#1198077 ltc#197299).
- powerpc/perf: Include PMCs as part of per-cpu cpuhw_events struct
(bsc#1198077 ltc#197299).
- powerpc/pseries: Fix use after free in remove_phb_dynamic()
(bsc#1065729).
- powerpc/sysdev: fix incorrect use to determine if list is empty
(bsc#1065729).
- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).
- powerpc/xive: fix return value of __setup handler (bsc#1065729).
- printk: Add panic_in_progress helper (bsc#1197894).
- printk: disable optimistic spin during panic (bsc#1197894).
- pwm: lpc18xx-sct: Initialize driver data and hardware before
pwmchip_add() (git-fixes).
- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).
- remoteproc: qcom_wcnss: Add missing of_node_put() in
wcnss_alloc_memory_region (git-fixes).
- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region
(git-fixes).
- Revert "build initrd without systemd" (bsc#1197300).
- Revert "Input: clear BTN_RIGHT/MIDDLE on buttonpads" (bsc#1197243).
- Revert "module, async: async_synchronize_full() on module init iff async
is used" (bsc#1197888).
- Revert "Revert "build initrd without systemd" (bsc#1197300)"
- Revert "usb: dwc3: gadget: Use list_replace_init() before traversing
lists" (git-fixes).
- s390/bpf: Perform r1 range checking before accessing jit->seen_reg
(git-fixes).
- s390/gmap: do not unconditionally call pte_unmap_unlock() in
__gmap_zap() (git-fixes).
- s390/gmap: validate VMA in __gmap_zap() (git-fixes).
- s390/hypfs: include z/VM guests with access control group set
(bsc#1195640 LTC#196352).
- s390/kexec_file: fix error handling when applying relocations
(git-fixes).
- s390/kexec: fix memory leak of ipl report buffer (git-fixes).
- s390/kexec: fix return code handling (git-fixes).
- s390/mm: fix VMA and page table handling code in storage key handling
functions (git-fixes).
- s390/mm: validate VMA in PGSTE manipulation functions (git-fixes).
- s390/module: fix loading modules with a lot of relocations (git-fixes).
- s390/pci_mmio: fully validate the VMA before calling follow_pte()
(git-fixes).
- s390/tape: fix timer initialization in tape_std_assign() (bsc#1197677
LTC#197378).
- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).
- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).
- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).
- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).
- scsi: lpfc: Fix queue failures when recovering from PCI parity error
(bsc#1197675 bsc#1196478).
- scsi: lpfc: Fix typos in comments (bsc#1197675).
- scsi: lpfc: Fix unload hang after back to back PCI EEH faults
(bsc#1197675 bsc#1196478).
- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675
bsc#1196478).
- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).
- scsi: lpfc: Reduce log messages seen after firmware download
(bsc#1197675).
- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).
- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled
(bsc#1197675).
- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).
- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path
(bsc#1197675).
- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4
(bsc#1197675).
- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths
(bsc#1197675).
- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths
(bsc#1197675).
- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).
- scsi: lpfc: Use fc_block_rport() (bsc#1197675).
- scsi: lpfc: Use kcalloc() (bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped()
(bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).
- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).
- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).
- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).
- scsi: qla2xxx: Fix incorrect reporting of task management failure
(bsc#1197661).
- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).
- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test
(bsc#1197661).
- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).
- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).
- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).
- scsi: qla2xxx: Fix typos in comments (bsc#1197661).
- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).
- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).
- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).
- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).
- scsi: qla2xxx: Use correct feature type field during RFF_ID processing
(bsc#1197661).
- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).
- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).
- serial: 8250_lpss: Balance reference count for PCI DMA device
(git-fixes).
- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).
- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).
- serial: core: Fix the definition name in the comment of UPF_* flags
(git-fixes).
- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).
- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).
- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).
- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).
- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).
- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).
- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).
- staging:iio:adc:ad7280a: Fix handing of device address bit reversing
(git-fixes).
- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).
- tcp: change source port randomizarion at connect() time (bsc#1180153).
- team: protect features update by RCU to avoid deadlock (git-fixes).
- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).
- thermal: int340x: Increase bitmap size (git-fixes).
- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister()
(git-fixes).
- Update config files (bsc#1195926 bsc#1175667). VIRTIO_PCI=m ->
VIRTIO_PCI=y
- usb: bdc: Adb shows offline after resuming from S2 (git-fixes).
- usb: bdc: Fix a resource leak in the error handling path of
'bdc_probe()' (git-fixes).
- usb: bdc: Fix unused assignment in bdc_probe() (git-fixes).
- usb: bdc: remove duplicated error message (git-fixes).
- usb: bdc: Use devm_clk_get_optional() (git-fixes).
- usb: bdc: use devm_platform_ioremap_resource() to simplify code
(git-fixes).
- usb: dwc2: Fix Stalling a Non-Isochronous OUT EP (git-fixes).
- usb: dwc2: gadget: Fix GOUTNAK flow for Slave mode (git-fixes).
- usb: dwc2: gadget: Fix kill_all_requests race (git-fixes).
- usb: dwc3: gadget: Use list_replace_init() before traversing lists
(git-fixes).
- usb: dwc3: meson-g12a: Disable the regulator in the error handling path
of the probe (git-fixes).
- usb: dwc3: qcom: add IRQ check (git-fixes).
- usb: gadget: bdc: use readl_poll_timeout() to simplify code (git-fixes).
- usb: gadget: Fix use-after-free bug by not setting udc->dev.driver
(git-fixes).
- usb: gadget: rndis: prevent integer overflow in rndis_set_response()
(git-fixes).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- usb: hub: Fix locking issues with address0_mutex (git-fixes).
- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).
- VFS: filename_create(): fix incorrect intent (bsc#1197534).
- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe()
(git-fixes).
- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).
- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).
- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to
avoid black screen (git-fixes).
- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to
avoid black screen (git-fixes).
- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of
(git-fixes).
- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).
- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).
- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).
- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).
- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).
- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).
- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).
- x86/cpu: Add hardware-enforced cache coherency as a CPUID feature
(bsc#1178134).
- x86/mm/pat: Do not flush cache if hardware enforces cache coherency
across encryption domnains (bsc#1178134).
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
(bsc#1178134).
- x86/speculation: Warn about Spectre v2 LFENCE mitigation (bsc#1178134).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done()
(bsc#1196488, XSA-396).
- xhci: fix garbage USBSTS being logged in some cases (git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1163=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1163=1
Package List:
- openSUSE Leap 15.3 (noarch):
kernel-devel-azure-5.3.18-150300.38.53.1
kernel-source-azure-5.3.18-150300.38.53.1
- openSUSE Leap 15.3 (x86_64):
cluster-md-kmp-azure-5.3.18-150300.38.53.1
cluster-md-kmp-azure-debuginfo-5.3.18-150300.38.53.1
dlm-kmp-azure-5.3.18-150300.38.53.1
dlm-kmp-azure-debuginfo-5.3.18-150300.38.53.1
gfs2-kmp-azure-5.3.18-150300.38.53.1
gfs2-kmp-azure-debuginfo-5.3.18-150300.38.53.1
kernel-azure-5.3.18-150300.38.53.1
kernel-azure-debuginfo-5.3.18-150300.38.53.1
kernel-azure-debugsource-5.3.18-150300.38.53.1
kernel-azure-devel-5.3.18-150300.38.53.1
kernel-azure-devel-debuginfo-5.3.18-150300.38.53.1
kernel-azure-extra-5.3.18-150300.38.53.1
kernel-azure-extra-debuginfo-5.3.18-150300.38.53.1
kernel-azure-livepatch-devel-5.3.18-150300.38.53.1
kernel-azure-optional-5.3.18-150300.38.53.1
kernel-azure-optional-debuginfo-5.3.18-150300.38.53.1
kernel-syms-azure-5.3.18-150300.38.53.1
kselftests-kmp-azure-5.3.18-150300.38.53.1
kselftests-kmp-azure-debuginfo-5.3.18-150300.38.53.1
ocfs2-kmp-azure-5.3.18-150300.38.53.1
ocfs2-kmp-azure-debuginfo-5.3.18-150300.38.53.1
reiserfs-kmp-azure-5.3.18-150300.38.53.1
reiserfs-kmp-azure-debuginfo-5.3.18-150300.38.53.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3 (noarch):
kernel-devel-azure-5.3.18-150300.38.53.1
kernel-source-azure-5.3.18-150300.38.53.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3 (x86_64):
kernel-azure-5.3.18-150300.38.53.1
kernel-azure-debuginfo-5.3.18-150300.38.53.1
kernel-azure-debugsource-5.3.18-150300.38.53.1
kernel-azure-devel-5.3.18-150300.38.53.1
kernel-azure-devel-debuginfo-5.3.18-150300.38.53.1
kernel-syms-azure-5.3.18-150300.38.53.1
References:
https://www.suse.com/security/cve/CVE-2021-39698.html
https://www.suse.com/security/cve/CVE-2021-45402.html
https://www.suse.com/security/cve/CVE-2021-45868.html
https://www.suse.com/security/cve/CVE-2022-0850.html
https://www.suse.com/security/cve/CVE-2022-0854.html
https://www.suse.com/security/cve/CVE-2022-1011.html
https://www.suse.com/security/cve/CVE-2022-1016.html
https://www.suse.com/security/cve/CVE-2022-1048.html
https://www.suse.com/security/cve/CVE-2022-1055.html
https://www.suse.com/security/cve/CVE-2022-1195.html
https://www.suse.com/security/cve/CVE-2022-1198.html
https://www.suse.com/security/cve/CVE-2022-1199.html
https://www.suse.com/security/cve/CVE-2022-1205.html
https://www.suse.com/security/cve/CVE-2022-23036.html
https://www.suse.com/security/cve/CVE-2022-23037.html
https://www.suse.com/security/cve/CVE-2022-23038.html
https://www.suse.com/security/cve/CVE-2022-23039.html
https://www.suse.com/security/cve/CVE-2022-23040.html
https://www.suse.com/security/cve/CVE-2022-23041.html
https://www.suse.com/security/cve/CVE-2022-23042.html
https://www.suse.com/security/cve/CVE-2022-27223.html
https://www.suse.com/security/cve/CVE-2022-27666.html
https://www.suse.com/security/cve/CVE-2022-28388.html
https://www.suse.com/security/cve/CVE-2022-28389.html
https://www.suse.com/security/cve/CVE-2022-28390.html
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1156395
https://bugzilla.suse.com/1175667
https://bugzilla.suse.com/1177028
https://bugzilla.suse.com/1178134
https://bugzilla.suse.com/1179639
https://bugzilla.suse.com/1180153
https://bugzilla.suse.com/1189562
https://bugzilla.suse.com/1194589
https://bugzilla.suse.com/1194625
https://bugzilla.suse.com/1194649
https://bugzilla.suse.com/1194943
https://bugzilla.suse.com/1195051
https://bugzilla.suse.com/1195353
https://bugzilla.suse.com/1195640
https://bugzilla.suse.com/1195926
https://bugzilla.suse.com/1196018
https://bugzilla.suse.com/1196130
https://bugzilla.suse.com/1196196
https://bugzilla.suse.com/1196478
https://bugzilla.suse.com/1196488
https://bugzilla.suse.com/1196761
https://bugzilla.suse.com/1196823
https://bugzilla.suse.com/1196956
https://bugzilla.suse.com/1197227
https://bugzilla.suse.com/1197243
https://bugzilla.suse.com/1197245
https://bugzilla.suse.com/1197300
https://bugzilla.suse.com/1197302
https://bugzilla.suse.com/1197331
https://bugzilla.suse.com/1197343
https://bugzilla.suse.com/1197366
https://bugzilla.suse.com/1197389
https://bugzilla.suse.com/1197460
https://bugzilla.suse.com/1197462
https://bugzilla.suse.com/1197501
https://bugzilla.suse.com/1197534
https://bugzilla.suse.com/1197661
https://bugzilla.suse.com/1197675
https://bugzilla.suse.com/1197677
https://bugzilla.suse.com/1197702
https://bugzilla.suse.com/1197811
https://bugzilla.suse.com/1197812
https://bugzilla.suse.com/1197815
https://bugzilla.suse.com/1197817
https://bugzilla.suse.com/1197819
https://bugzilla.suse.com/1197820
https://bugzilla.suse.com/1197888
https://bugzilla.suse.com/1197889
https://bugzilla.suse.com/1197894
https://bugzilla.suse.com/1198027
https://bugzilla.suse.com/1198028
https://bugzilla.suse.com/1198029
https://bugzilla.suse.com/1198030
https://bugzilla.suse.com/1198031
https://bugzilla.suse.com/1198032
https://bugzilla.suse.com/1198033
https://bugzilla.suse.com/1198077
1
0
12 Apr '22
SUSE Security Update: Security update for xz
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1158-1
Rating: important
References: #1198062
Cross-References: CVE-2022-1271
CVSS scores:
CVE-2022-1271 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.0
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Realtime Extension 15-SP2
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for xz fixes the following issues:
- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames
(ZDI-CAN-16587). (bsc#1198062)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1158=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1158=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1158=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1158=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1158=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1158=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1158=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-1158=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1158=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1158=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1158=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1158=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-1158=1
- SUSE Linux Enterprise Realtime Extension 15-SP2:
zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-1158=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1158=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1158=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1158=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1158=1
- SUSE Linux Enterprise Micro 5.0:
zypper in -t patch SUSE-SUSE-MicroOS-5.0-2022-1158=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1158=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1158=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1158=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1158=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1158=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1158=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-1158=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-1158=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- openSUSE Leap 15.4 (noarch):
xz-lang-5.2.3-150000.4.7.1
- openSUSE Leap 15.4 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
xz-devel-32bit-5.2.3-150000.4.7.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- openSUSE Leap 15.3 (noarch):
xz-lang-5.2.3-150000.4.7.1
- openSUSE Leap 15.3 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
xz-devel-32bit-5.2.3-150000.4.7.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Manager Server 4.1 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Manager Server 4.1 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Manager Retail Branch Server 4.1 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Manager Proxy 4.1 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Manager Proxy 4.1 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server for SAP 15 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server for SAP 15 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP2-BCL (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP1-BCL (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Server 15-LTSS (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Realtime Extension 15-SP2 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
- SUSE Linux Enterprise Micro 5.0 (aarch64 x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Enterprise Storage 7 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Enterprise Storage 7 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE Enterprise Storage 6 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
- SUSE Enterprise Storage 6 (noarch):
xz-lang-5.2.3-150000.4.7.1
- SUSE CaaS Platform 4.0 (x86_64):
liblzma5-32bit-5.2.3-150000.4.7.1
liblzma5-32bit-debuginfo-5.2.3-150000.4.7.1
liblzma5-5.2.3-150000.4.7.1
liblzma5-debuginfo-5.2.3-150000.4.7.1
xz-5.2.3-150000.4.7.1
xz-debuginfo-5.2.3-150000.4.7.1
xz-debugsource-5.2.3-150000.4.7.1
xz-devel-5.2.3-150000.4.7.1
xz-static-devel-5.2.3-150000.4.7.1
- SUSE CaaS Platform 4.0 (noarch):
xz-lang-5.2.3-150000.4.7.1
References:
https://www.suse.com/security/cve/CVE-2022-1271.html
https://bugzilla.suse.com/1198062
1
0
SUSE-SU-2022:1162-1: important: Security update for subversion
by opensuse-security@opensuse.org 12 Apr '22
by opensuse-security@opensuse.org 12 Apr '22
12 Apr '22
SUSE Security Update: Security update for subversion
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1162-1
Rating: important
References: #1197939 #1197940
Cross-References: CVE-2021-28544 CVE-2022-24070
CVSS scores:
CVE-2021-28544 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVE-2022-24070 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for subversion fixes the following issues:
- CVE-2022-24070: Fixed a memory corruption issue in mod_dav_svn as used
by Apache HTTP server. This could be exploited by a remote attacker to
cause a denial of service (bsc#1197940).
- CVE-2021-28544: Fixed an information leak issue where Subversion servers
may reveal the original path of files protected by path-based
authorization (bsc#1197939).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1162=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1162=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-1162=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-1162=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1162=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
subversion-python-ctypes-1.10.6-150300.10.8.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libsvn_auth_gnome_keyring-1-0-1.10.6-150300.10.8.1
libsvn_auth_gnome_keyring-1-0-debuginfo-1.10.6-150300.10.8.1
libsvn_auth_kwallet-1-0-1.10.6-150300.10.8.1
libsvn_auth_kwallet-1-0-debuginfo-1.10.6-150300.10.8.1
subversion-1.10.6-150300.10.8.1
subversion-debuginfo-1.10.6-150300.10.8.1
subversion-debugsource-1.10.6-150300.10.8.1
subversion-devel-1.10.6-150300.10.8.1
subversion-perl-1.10.6-150300.10.8.1
subversion-perl-debuginfo-1.10.6-150300.10.8.1
subversion-python-1.10.6-150300.10.8.1
subversion-python-ctypes-1.10.6-150300.10.8.1
subversion-python-debuginfo-1.10.6-150300.10.8.1
subversion-ruby-1.10.6-150300.10.8.1
subversion-ruby-debuginfo-1.10.6-150300.10.8.1
subversion-server-1.10.6-150300.10.8.1
subversion-server-debuginfo-1.10.6-150300.10.8.1
subversion-tools-1.10.6-150300.10.8.1
subversion-tools-debuginfo-1.10.6-150300.10.8.1
- openSUSE Leap 15.3 (noarch):
subversion-bash-completion-1.10.6-150300.10.8.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
subversion-debuginfo-1.10.6-150300.10.8.1
subversion-debugsource-1.10.6-150300.10.8.1
subversion-server-1.10.6-150300.10.8.1
subversion-server-debuginfo-1.10.6-150300.10.8.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
subversion-debuginfo-1.10.6-150300.10.8.1
subversion-debugsource-1.10.6-150300.10.8.1
subversion-perl-1.10.6-150300.10.8.1
subversion-perl-debuginfo-1.10.6-150300.10.8.1
subversion-python-1.10.6-150300.10.8.1
subversion-python-debuginfo-1.10.6-150300.10.8.1
subversion-tools-1.10.6-150300.10.8.1
subversion-tools-debuginfo-1.10.6-150300.10.8.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (noarch):
subversion-bash-completion-1.10.6-150300.10.8.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
subversion-1.10.6-150300.10.8.1
subversion-debuginfo-1.10.6-150300.10.8.1
subversion-debugsource-1.10.6-150300.10.8.1
subversion-devel-1.10.6-150300.10.8.1
References:
https://www.suse.com/security/cve/CVE-2021-28544.html
https://www.suse.com/security/cve/CVE-2022-24070.html
https://bugzilla.suse.com/1197939
https://bugzilla.suse.com/1197940
1
0
SUSE-SU-2022:1156-1: important: Security update for opensc
by opensuse-security@opensuse.org 12 Apr '22
by opensuse-security@opensuse.org 12 Apr '22
12 Apr '22
SUSE Security Update: Security update for opensc
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1156-1
Rating: important
References: #1114649 #1191957 #1191992 #1192000 #1192005
Cross-References: CVE-2021-42779 CVE-2021-42780 CVE-2021-42781
CVE-2021-42782
CVSS scores:
CVE-2021-42779 (SUSE): 4.2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-42780 (SUSE): 2 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-42781 (SUSE): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CVE-2021-42782 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Realtime Extension 15-SP2
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for opensc fixes the following issues:
Security issues fixed:
- CVE-2021-42782: Stack buffer overflow issues in various places
(bsc#1191957).
- CVE-2021-42781: Fixed multiple heap buffer overflows in
pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).
Non-security issues fixed:
- Fixes segmentation fault in 'pkcs11-tool.c'. (bsc#1114649)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1156=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1156=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1156=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1156=1
- SUSE Linux Enterprise Realtime Extension 15-SP2:
zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-1156=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1156=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1156=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1156=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1156=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-1156=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- openSUSE Leap 15.3 (x86_64):
opensc-32bit-0.19.0-150100.3.16.1
opensc-32bit-debuginfo-0.19.0-150100.3.16.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
- SUSE CaaS Platform 4.0 (x86_64):
opensc-0.19.0-150100.3.16.1
opensc-debuginfo-0.19.0-150100.3.16.1
opensc-debugsource-0.19.0-150100.3.16.1
References:
https://www.suse.com/security/cve/CVE-2021-42779.html
https://www.suse.com/security/cve/CVE-2021-42780.html
https://www.suse.com/security/cve/CVE-2021-42781.html
https://www.suse.com/security/cve/CVE-2021-42782.html
https://bugzilla.suse.com/1114649
https://bugzilla.suse.com/1191957
https://bugzilla.suse.com/1191992
https://bugzilla.suse.com/1192000
https://bugzilla.suse.com/1192005
1
0
openSUSE-RU-2022:1143-1: moderate: Recommended update for libxkbcommon
by maintenance@opensuse.org 11 Apr '22
by maintenance@opensuse.org 11 Apr '22
11 Apr '22
openSUSE Recommended Update: Recommended update for libxkbcommon
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:1143-1
Rating: moderate
References: #1184688 SLE-24272
Affected Products:
openSUSE Leap 15.3/update/i586/patchinfo.23586
______________________________________________________________________________
An update that has one recommended fix and contains one
feature can now be installed.
Description:
This update for libxkbcommon fixes the following issues:
- Update to release 1.3.0 (jsc#SLE-24272)
* `xkbcli list` was changed to output YAML instead of a custom format.
* Fix segmentation fault in case-insensitive `xkb_keysym_from_name` for
certain values like the empty string.
- Update to release 1.2.1 [boo#1184688]
* Fix `xkb_x11_keymap_new_from_device()` failing when the keymap
contains key types with missing level names, like the
one used by the `numpad:mac` option in xkeyboard-config. (Regressed in
1.2.0.)
- Update to release 1.2.0
* `xkb_x11_keymap_new_from_device()` is much faster. It now performs
only 2 roundtrips to the X server, instead of dozens (in first-time
calls).
* Case-sensitive `xkb_keysym_from_name()` is much faster.
* Keysym names of the form `0x12AB` and `U12AB` are parsed more strictly.
* Compose files now have a size limit (65535 internal nodes).
* Compose table loading (`xkb_compose_table_new_from_locale()` and
similar) is much faster.
- Update to release 1.1.0
* Update keysym definitions to latest xorgproto. In particular, this
adds many special keysyms corresponding to Linux evdev keycodes.
* New XKB_KEY_* definitions.
- Update to release 1.0.3
* Fix (hopefully) a segfault in xkb_x11_keymap_new_from_device() in some
unclear situation (bug introduced in 1.0.2).
* Fix keymaps created with xkb_x11_keymap_new_from_device() do not have
level names (bug introduced in 0.8.0).
- Update to release 1.0.2
* Fix a bug where a keysym that cannot be resolved in a keymap gets
compiled to a garbage keysym. Now it is set to XKB_KEY_NoSymbol
instead.
* Improve the speed of xkb_x11_keymap_new_from_device() on repeated
calls in the same xkb_context().
- Update to release 1.0.1
* Make the table output of `xkbcli how-to-type` aligned.
- Update to release 1.0.0
* Now it is possible to add custom layouts and options at the system
(/etc) and user (~/.config) level, at least when libxkbcommon is in
use.
* libxkbregistry is a C library that lists available XKB models, layouts
and variants for a given ruleset. This is a separate library (.so/.pc
files) and aimed at tools that provide a listing of available keyboard
layouts to the user.
* Add an `xkbcli` command-line utility.
- Update to release 0.10.0
* Fix quadratic complexity in the XKB file parser.
* Add $XDG_CONFIG_HOME/xkb to the default search path. If
$XDG_CONFIG_HOME is not set, $HOME/.config/xkb is used. If $HOME is
not set, the path is not added. The XDG path is looked up before the
existing default search path $HOME/.xkb.
* Add support for include statements in XKB rules files.
* Fix bug where the merge mode only applied to the first vmod in a
"virtual_modifiers" statement.
* Reject interpret modifier predicate with more than one value.
* Correctly handle capitalization of the ssharp keysym.
- Update to release 0.9.1
* Fix context creation failing when run in privileged processes as
defined by `secure_getenv(3)`, e.g. GDM.
- Update to release 0.9.0
* Move ~/.xkb to before XKB_CONFIG_ROOT. This enables the user to have
full control of the keymap definitions, instead of
only augmenting them.
- Update to new upstream release 0.8.3
* New APIs: XKB_KEY_XF86MonBrightnessCycle,
XKB_KEY_XF86RotationLockToggle.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3/update/i586/patchinfo.23586:
zypper in -t patch openSUSE-SLE-15.3-2022-1143=1
Package List:
- openSUSE Leap 15.3/update/i586/patchinfo.23586 (aarch64 ppc64le s390x x86_64):
libxkbcommon-debugsource-1.3.0-150300.10.3.1
libxkbcommon-devel-1.3.0-150300.10.3.1
libxkbcommon-x11-0-1.3.0-150300.10.3.1
libxkbcommon-x11-0-debuginfo-1.3.0-150300.10.3.1
libxkbcommon-x11-devel-1.3.0-150300.10.3.1
libxkbcommon0-1.3.0-150300.10.3.1
libxkbcommon0-debuginfo-1.3.0-150300.10.3.1
- openSUSE Leap 15.3/update/i586/patchinfo.23586 (x86_64):
libxkbcommon-devel-32bit-1.3.0-150300.10.3.1
libxkbcommon-x11-0-32bit-1.3.0-150300.10.3.1
libxkbcommon-x11-0-32bit-debuginfo-1.3.0-150300.10.3.1
libxkbcommon-x11-devel-32bit-1.3.0-150300.10.3.1
libxkbcommon0-32bit-1.3.0-150300.10.3.1
libxkbcommon0-32bit-debuginfo-1.3.0-150300.10.3.1
References:
https://bugzilla.suse.com/1184688
1
0
08 Apr '22
openSUSE Recommended Update: Recommended update to vlc
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:0109-1
Rating: moderate
References:
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
vlc updated to fix various issues.
Update to version 3.0.17.3:
+ This is a fixup release which fixes a regression that could cause a lack
of audio for adaptive streaming playback. It is identical to 3.0.17.2
otherwise.
+ This updates contains various fixes and improvements:
- Major adaptive streaming stack overhaul
- Major codec updates
- Many third party libraries update
- Allow brackets in the path section of URLs
- Better notch support for new macbooks
- Add support for DAV video and Webp image formats
- Improve AV1 live streaming support
- Several SRT support improvements
- Numerous crash fixes
- Update youtube script
Changes from version 3.0.17.2:
+ This is a fixup release which fixes youtube playback and contextual
menus on integrated video for the Qt interface. It is identical to
3.0.17-1 otherwise.
Update to version 3.0.17:
+ Core:
* Fix a regression in parsing secondary source MRLs
* Allow brackets in path part of URLs
+ Access:
* Fix support for screen capture on macOS with avcapture
* Fix closing of HTTP 1.x connections
* Improve HTTP2 memory usage
* Improve AVCapture module
* Improve AudioCD support (audio/data mixed mode, musicbrainz)
* Improve SMB compatibility by changing the read size
* Several improvements on the SRT modules (including streamID)
+ Decoders/Packetizers:
* Add support for DTS LBR
* Fix some HEVC hardware decoding on Windows and crashes when aspect
ratio changes
* Fix hardware decoding for some AMD GPU drivers
* Add support for new Fourcc for E-AC3, AV1, GeoVision
* Fix crashes with VP9 streams
* Fix styling issues with subs tx3g (mp4) tracks
* Fix playback of live AV1 streams
+ Audio Output:
* iOS/tvOS: add support for spatial audio
* macOS: fix some channels ordering for > 5.1 channels
* Android: rework audio volume management
+ Video Output:
* Fix a D3D11 crash when the stream changes aspect ratio
+ Demux:
* Major overhaul of the adaptive streaming stack
* Support for DAV video files
* Add WebP image mapping
* Fix missing audio start of Opus audio in MKV/WebM
* Fix an infinite loop in MP4
* Fix attachments extractions in ogg files
* Support Uncompressed audio in mp4 (ISO/IEC 23003-5)
* Fix some lip sync issue in rare MPEG-TS streams
+ Interface:
* Qt/macOS: Fixup user provided URLs
* Add safe area handling on macOS
* Qt: improve preferences search
* Qt: fix --no-mouse-events option
+ Misc:
* Update YouTube script
* Fix Icecast directory parsing which could lead to missing entries
* Improve UPnP compatibility with some servers
Update to version 3.0.16:
+ Video Output: Fix a D3D11 crash on Windows 8/8.1.
+ Access: Fix RTSP server timeout handling.
+ Interfaces: macOS: Add touchbar support.
+ Misc: Multiple settings improvements.
Changes from version 3.0.15:
+ Core: Add Opus & Alac wave format mappings.
+ Access: Fix opening DVD folders with non-ascii characters.
+ Demux:
- Fix asf regression with broadcast streams.
- MP4: Fix audio drop on seek.
+ Video Output:
- Fix seek & volume sliders overlapping with subtitles.
- Fix delays when seeking with D3D11.
+ Text renderer: Improve freetype fonts outlining.
+ Misc: Fix GnuTLS support for Windows XP.
Changes from version 3.0.14:
+ Core:
- Fix double loading of slave input.
- Fix an issue causing the auto-updater not to launch the new version
installer.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-2022-109=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libvlc5-3.0.17.3-lp153.2.3.1
libvlc5-debuginfo-3.0.17.3-lp153.2.3.1
libvlccore9-3.0.17.3-lp153.2.3.1
libvlccore9-debuginfo-3.0.17.3-lp153.2.3.1
vlc-3.0.17.3-lp153.2.3.1
vlc-codec-gstreamer-3.0.17.3-lp153.2.3.1
vlc-codec-gstreamer-debuginfo-3.0.17.3-lp153.2.3.1
vlc-debuginfo-3.0.17.3-lp153.2.3.1
vlc-debugsource-3.0.17.3-lp153.2.3.1
vlc-devel-3.0.17.3-lp153.2.3.1
vlc-jack-3.0.17.3-lp153.2.3.1
vlc-jack-debuginfo-3.0.17.3-lp153.2.3.1
vlc-noX-3.0.17.3-lp153.2.3.1
vlc-noX-debuginfo-3.0.17.3-lp153.2.3.1
vlc-opencv-3.0.17.3-lp153.2.3.1
vlc-opencv-debuginfo-3.0.17.3-lp153.2.3.1
vlc-qt-3.0.17.3-lp153.2.3.1
vlc-qt-debuginfo-3.0.17.3-lp153.2.3.1
vlc-vdpau-3.0.17.3-lp153.2.3.1
vlc-vdpau-debuginfo-3.0.17.3-lp153.2.3.1
- openSUSE Leap 15.3 (noarch):
vlc-lang-3.0.17.3-lp153.2.3.1
References:
1
0
openSUSE-RU-2022:0111-1: moderate: Recommended update for hylafax+
by maintenance@opensuse.org 08 Apr '22
by maintenance@opensuse.org 08 Apr '22
08 Apr '22
openSUSE Recommended Update: Recommended update for hylafax+
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:0111-1
Rating: moderate
References:
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
hylafax+ was updated to version 7.0.5.
* hylafax.diff removed - included in source
* extend Class1RecvAbortOK = 0 timeout to 500 ms (4 Dec 2021)
* cope with Si2435 V.34/V.8 connection glitch (17, 19 Nov 2021)
* cope with spurious +FCERROR or other delayed messages from modem (26 Oct
2021)
* avoid letting corrupt RTC signals lead to RTN (26 Oct 2021)
* don't refer to DCN as an invalid response in error messages (20 Oct 2021)
* handle TSI during procedural interrupt (19 Oct 2021)
* do better with waiting on prologue frames from receiver (13 Oct 2021)
* cope with echo of ERR (13 Oct 2021)
* run ps2fax, pdf2fax, tiff2fax, pcl2fax coverters as fax user (12 Oct
2021)
* attempt to cope with receivers who signal RTN in ECM Phase D (23 Sep
2021)
* fix hfaxd build when LDAP libs are not present (23 Sep 2021)
* handle PPR echo after fourth PPR (22 Sep 2021)
* don't use CRP when waiting for CFR following training (15 Sep 2021)
* attempt to cope with receivers which signal CFR after PPS (14 Sep 2021)
* cope with senders who signal FTT in Phase D (10 Sep 2021)
* fix problem with handling NSF/CSI/DIS frame after CTC/EOR (9 Sep 2021)
* cope with senders who signal PPS without the PPS FCF (9 Sep 2021)
* handle echo of PPR when expecting CTC/EOR (8 Sep 2021)
* add failure messages for unspecified training failures (7 Sep 2021)
* don't use CRP when waiting for CTR (7 Sep 2021)
* handle echo of EOR, don't use CRP when waiting for ERR (7 Sep 2021)
* repeat PIN if sender repeats post-page or partial-page message (7-8 Sep
2021)
version 7.0.4:
* README.SUSE renamed
* hylafax.diff added for boo#1191571 (pre-correction)
* Dependencies on systemd-services adjusted
* retry training twice at the same bitrate unless FTT (26 Aug 2021)
* add missing reason messages for session failures (21 Aug 2021)
* stop attempts to send or receive signals if the call ended prematurely
(16-19 Aug 2021)
* add Class1HasRMHookIndication (16 Aug 2021)
* don't attempt sending DCN if we're already on hook (15, 17 Aug 2021)
* end session sooner if receiver hangs up immediately after TCF or during
prologue (14 Aug 2021)
* fix some behavior following frame reception timeouts (13 Aug 2021)
* improve behavior if procedural interrupt fails (12 Aug 2021)
* handle sender repeating RR after we transmit MCF (10 Aug 2021)
* add session logging of receipt of CFR/FTT signals (3 Aug 2021)
* cope with receipt of PPR following CTC (3 Aug 2021)
* attempt to cope with NSF/CSI/DIS after PPS, CTR, ERR, RR and improve
coping with the same after MPS/EOP/EOM (2, 12, 14, 18 Aug 2021)
* identify DCN after PPS as a receiver abort (2 Aug 2021)
* attempt to cope with receipt of CTR after sending PPS (2 Aug 2021)
* remove use of deprecated libtiff integer types and "register" storage
class specifier (25 Jul 2021)
* don't employ senderFumblesECM if V.34-Fax was negotiated (25 Jul 2021)
* update configure to accept libtiff v4.2 and v4.3 (24 Jul 2021)
* fix page handling "botch" if a job's first and previous attempts were on
a proxy (20 Jul 2021)
* fix data timeout for bitrates less than 14400 bps when non-zero scanline
time (15 Jul 2021)
* try to cope with T.38 invite stutter at beginning of send (15 Jul 2021)
* decouple session logging from direct filesystem I/O (15 Jul 2021)
* try to help receivers who may expect initial 1-bits to start high-speed
data (8, 9 Jul, 4 Aug 2021)
* improve tenacity of "persistent" ECM (26 Jun 2021)
* maintain the same SSL Fax passcode during a single session (20 May 2021)
* log detection of binary file transfer support in receivers (1 Apr 2021)
* add support for SiLabs Si2417/Si2435 (5 Feb 2021)
- Added hardening to systemd service(s) (bsc#1181400). Modified:
* hylafax-faxgetty@.service
* hylafax-faxq.service
* hylafax-faxqclean.service
* hylafax-hfaxd.service
* hylafax-usage.service
- Drop ProtectClock hardening, can cause issues if other device acceess is
needed
- Add hylafax service and helper for use with firewalld, and explain the
details in README.SUSE.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-2022-111=1
Package List:
- openSUSE Leap 15.3 (aarch64 i586 ppc64le s390x x86_64):
hylafax+-7.0.5-lp153.2.3.1
hylafax+-client-7.0.5-lp153.2.3.1
hylafax+-client-debuginfo-7.0.5-lp153.2.3.1
hylafax+-debuginfo-7.0.5-lp153.2.3.1
hylafax+-debugsource-7.0.5-lp153.2.3.1
libfaxutil7_0_5-7.0.5-lp153.2.3.1
libfaxutil7_0_5-debuginfo-7.0.5-lp153.2.3.1
References:
1
0
openSUSE-SU-2022:0110-1: important: Security update for opera
by opensuse-security@opensuse.org 08 Apr '22
by opensuse-security@opensuse.org 08 Apr '22
08 Apr '22
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0110-1
Rating: important
References:
Cross-References: CVE-2021-30506 CVE-2021-30507 CVE-2021-30508
CVE-2021-30509 CVE-2021-30510 CVE-2021-30511
CVE-2021-30512 CVE-2021-30513 CVE-2021-30514
CVE-2021-30515 CVE-2021-30516 CVE-2021-30517
CVE-2021-30518 CVE-2021-30519 CVE-2021-30520
CVE-2021-30541 CVE-2021-30544 CVE-2021-30545
CVE-2021-30546 CVE-2021-30547 CVE-2021-30548
CVE-2021-30549 CVE-2021-30550 CVE-2021-30551
CVE-2021-30552 CVE-2021-30553 CVE-2021-30554
CVE-2021-30555 CVE-2021-30556 CVE-2021-30557
CVE-2021-30560 CVE-2021-30561 CVE-2021-30562
CVE-2021-30563 CVE-2021-30564 CVE-2021-30590
CVE-2021-30591 CVE-2021-30592 CVE-2021-30593
CVE-2021-30594 CVE-2021-30596 CVE-2021-30597
CVE-2021-30598 CVE-2021-30599 CVE-2021-30600
CVE-2021-30601 CVE-2021-30602 CVE-2021-30603
CVE-2021-30604 CVE-2021-30606 CVE-2021-30607
CVE-2021-30608 CVE-2021-30609 CVE-2021-30610
CVE-2021-30611 CVE-2021-30612 CVE-2021-30613
CVE-2021-30614 CVE-2021-30615 CVE-2021-30616
CVE-2021-30617 CVE-2021-30618 CVE-2021-30619
CVE-2021-30620 CVE-2021-30621 CVE-2021-30622
CVE-2021-30623 CVE-2021-30624 CVE-2021-30625
CVE-2021-30626 CVE-2021-30627 CVE-2021-30628
CVE-2021-30629 CVE-2021-30630 CVE-2021-30631
CVE-2021-30632 CVE-2021-30633 CVE-2021-37974
CVE-2021-37975 CVE-2021-37976 CVE-2021-37977
CVE-2021-37978 CVE-2021-37979 CVE-2021-37980
CVE-2021-37981 CVE-2021-37982 CVE-2021-37983
CVE-2021-37984 CVE-2021-37985 CVE-2021-37986
CVE-2021-37987 CVE-2021-37988 CVE-2021-37989
CVE-2021-37990 CVE-2021-37991 CVE-2021-37992
CVE-2021-37993 CVE-2021-37994 CVE-2021-37995
CVE-2021-37996 CVE-2021-37997 CVE-2021-37998
CVE-2021-37999 CVE-2021-38001 CVE-2021-38002
CVE-2021-38003 CVE-2021-38004 CVE-2021-38005
CVE-2021-38006 CVE-2021-38007 CVE-2021-38008
CVE-2021-38009 CVE-2021-38010 CVE-2021-38011
CVE-2021-38012 CVE-2021-38013 CVE-2021-38014
CVE-2021-38015 CVE-2021-38016 CVE-2021-38017
CVE-2021-38019 CVE-2021-38020 CVE-2021-38021
CVE-2021-38022 CVE-2021-4052 CVE-2021-4053
CVE-2021-4054 CVE-2021-4055 CVE-2021-4056
CVE-2021-4057 CVE-2021-4058 CVE-2021-4059
CVE-2021-4061 CVE-2021-4062 CVE-2021-4063
CVE-2021-4064 CVE-2021-4065 CVE-2021-4066
CVE-2021-4067 CVE-2021-4068 CVE-2021-4078
CVE-2021-4079 CVE-2021-4098 CVE-2021-4099
CVE-2021-4100 CVE-2021-4101 CVE-2021-4102
CVE-2022-0096 CVE-2022-0097 CVE-2022-0098
CVE-2022-0099 CVE-2022-0100 CVE-2022-0101
CVE-2022-0102 CVE-2022-0103 CVE-2022-0104
CVE-2022-0105 CVE-2022-0106 CVE-2022-0107
CVE-2022-0108 CVE-2022-0109 CVE-2022-0110
CVE-2022-0111 CVE-2022-0112 CVE-2022-0113
CVE-2022-0114 CVE-2022-0115 CVE-2022-0116
CVE-2022-0117 CVE-2022-0118 CVE-2022-0120
CVE-2022-0289 CVE-2022-0290 CVE-2022-0291
CVE-2022-0292 CVE-2022-0293 CVE-2022-0294
CVE-2022-0295 CVE-2022-0296 CVE-2022-0297
CVE-2022-0298 CVE-2022-0300 CVE-2022-0301
CVE-2022-0302 CVE-2022-0304 CVE-2022-0305
CVE-2022-0306 CVE-2022-0307 CVE-2022-0308
CVE-2022-0309 CVE-2022-0310 CVE-2022-0311
CVE-2022-0452 CVE-2022-0453 CVE-2022-0454
CVE-2022-0455 CVE-2022-0456 CVE-2022-0457
CVE-2022-0458 CVE-2022-0459 CVE-2022-0460
CVE-2022-0461 CVE-2022-0462 CVE-2022-0463
CVE-2022-0464 CVE-2022-0465 CVE-2022-0466
CVE-2022-0467 CVE-2022-0468 CVE-2022-0469
CVE-2022-0470 CVE-2022-0603 CVE-2022-0604
CVE-2022-0605 CVE-2022-0606 CVE-2022-0607
CVE-2022-0608 CVE-2022-0609 CVE-2022-0610
CVE-2022-0789 CVE-2022-0790 CVE-2022-0791
CVE-2022-0792 CVE-2022-0793 CVE-2022-0794
CVE-2022-0795 CVE-2022-0796 CVE-2022-0797
CVE-2022-0798 CVE-2022-0799 CVE-2022-0800
CVE-2022-0801 CVE-2022-0802 CVE-2022-0803
CVE-2022-0804 CVE-2022-0805 CVE-2022-0806
CVE-2022-0807 CVE-2022-0808 CVE-2022-0809
CVE-2022-1096
CVSS scores:
CVE-2021-30506 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30507 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30508 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30509 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30510 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30511 (NVD) : 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CVE-2021-30512 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30513 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30514 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30515 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30516 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30517 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30518 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30519 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30520 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30544 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30544 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30545 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30545 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30546 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30546 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30547 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30547 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30548 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30548 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30549 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30549 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30550 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30550 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30551 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30551 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30552 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30552 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30553 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30553 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30554 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30555 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30556 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30557 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30625 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30626 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30627 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30628 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30629 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30630 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-30632 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-30633 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2021-37974 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37975 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37976 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-37977 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37978 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37979 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37980 (NVD) : 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
CVE-2021-37981 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2021-37982 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37983 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37984 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37985 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37986 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37987 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37988 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37989 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-37990 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-37991 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37992 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37993 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37994 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-37995 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-37996 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-37997 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37998 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37999 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVE-2021-38001 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38002 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2021-38003 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38004 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-38005 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38006 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38007 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38008 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38009 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-38010 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-38011 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38012 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38013 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2021-38014 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38015 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38016 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38017 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38019 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-38020 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2021-38021 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-38022 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-4052 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4053 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4054 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-4055 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4056 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4057 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4058 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4059 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-4061 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4062 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4063 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4064 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4065 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4066 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4067 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4068 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-4078 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4079 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4098 (NVD) : 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
CVE-2021-4099 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4100 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4101 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4102 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0096 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0097 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2022-0098 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0099 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0100 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0101 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0102 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0103 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0104 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0105 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0106 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0107 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0108 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0109 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0110 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2022-0111 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2022-0112 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2022-0113 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0114 (NVD) : 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CVE-2022-0115 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0116 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2022-0117 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0118 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2022-0120 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0289 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0290 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2022-0291 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0292 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2022-0293 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0294 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0295 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0296 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0297 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0298 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0300 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0301 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0302 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0304 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0305 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2022-0306 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0307 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0308 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0309 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2022-0310 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0311 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.4:NonFree
______________________________________________________________________________
An update that fixes 241 vulnerabilities is now available.
Description:
This update for opera fixes the following issues:
Update to 85.0.4341.28
- CHR-8816 Update chromium on desktop-stable-99-4341 to 99.0.4844.84
- DNA-98092 Crash at views::MenuItemView::GetMenuController()
- DNA-98278 Translations for O85
- DNA-98320 [Mac] Unable to delete recent search entries
- DNA-98614 Show recent searches for non-BABE users
- DNA-98615 Allow removal of recent searches
- DNA-98616 Add recent searches to ���old��� BABE
- DNA-98617 Make it possible to disable ad-blocker per-country
- DNA-98651 Remove Instagram and Facebook Messenger in Russia
- DNA-98653 Add flag #recent-searches
- DNA-98696 smoketest
PageInfoHistoryDataSourceTest.FormatTimestampString failing
- DNA-98703 Port Chromium issue 1309225 to Opera Stable
- The update to chromium 99.0.4844.84 fixes following issues: CVE-2022-1096
- Changes in 85.0.4341.18
- CHR-8789 Update chromium on desktop-stable-99-4341 to 99.0.4844.51
- DNA-98059 [Linux] Crash at
opera::FreedomSettingsImpl::IsBypassForDotlessDomainsEnabled
- DNA-98349 [Linux] Crash at bluez::BluezDBusManager::Get()
- DNA-98126 System crash dialog shown on macOS <= 10.15
- DNA-98331 [Snap] Meme generator cropping / resizing broken
- DNA-98394 Audio tab indicator set to "muted" on videoconferencing sites
- DNA-98481 Report errors in opauto_collector
- The update to chromium 99.0.4844.51 fixes following issues:
CVE-2022-0789, CVE-2022-0790, CVE-2022-0791, CVE-2022-0792,
CVE-2022-0793, CVE-2022-0794, CVE-2022-0795, CVE-2022-0796,
CVE-2022-0797, CVE-2022-0798, CVE-2022-0799, CVE-2022-0800,
CVE-2022-0801, CVE-2022-0802, CVE-2022-0803, CVE-2022-0804,
CVE-2022-0805, CVE-2022-0806, CVE-2022-0807, CVE-2022-0808, CVE-2022-0809
- Changes in 85.0.4341.13
- DNA-94119 Upgrade curl to 7.81.0
- DNA-97849 [Mac monterey] System shortcut interfere with Opera���s
`ToggleSearchInOpenTabs` shortcut
- DNA-98204 Automatic popout happens when video is paused
- DNA-98231 Shortcuts are blocked by displayed tab tooltip when
triggered quickly after tooltip appears
- DNA-98321 Add thinlto-cache warnings to suppression list
- DNA-98395 Promote O85 to stable
- Complete Opera 85.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-85/
- Update to 84.0.4316.42
- DNA-94119 Upgrade curl to 7.81.0
- DNA-98092 Crash at views::MenuItemView::GetMenuController()
- DNA-98204 Automatic popout happens when video is paused
- DNA-98231 Shortcuts are blocked by displayed tab tooltip when
triggered quickly after tooltip appears
- Update to 84.0.4316.31
- CHR-8772 Update chromium on desktop-stable-98-4316 to 98.0.4758.109
- DNA-97573 [Win][Lin]���Close tab��� button is not displayed on tabs
playing media when many tabs are open
- DNA-97729 cancelling the process uploading custom Wallpaper crashes
the browser
- DNA-97871 Google meet tab���s icons don���t fit on pinned tab
- DNA-97872 Tab is being unpinned when video conferencing button is
clicked
- DNA-98039 Dark theme top sites have black background
- DNA-98117 Clicking current tab information should hide tooltip
- Update to 84.0.4316.21
- CHR-8762 Update chromium on desktop-stable-98-4316 to 98.0.4758.102
- DNA-97333 ���Add a site��� label on start page tile barely visible
- DNA-97691 Opera 84 translations
- DNA-97767 Wrong string in FR
- DNA-97855 Crash at ScopedProfileKeepAlive::~ScopedProfileKeepAlive()
- DNA-97982 Enable #snap-upstream-implementation on all streams
- The update to chromium 98.0.4758.102 fixes following issues:
CVE-2022-0603, CVE-2022-0604, CVE-2022-0605, CVE-2022-0606,
CVE-2022-0607, CVE-2022-0608, CVE-2022-0609, CVE-2022-0610
- Update to 84.0.4316.14
- CHR-8753 Update chromium on desktop-stable-98-4316 to 98.0.4758.82
- DNA-97177 Battery saver ��� the icon looks bad for DPI!=100%
- DNA-97614 automatic video pop-out for most popular websites
broadcasting Winter Olympic Games 2022
- DNA-97804 Promote O84 to stable
- The update to chromium 98.0.4758.82 fixes following issues:
CVE-2022-0452, CVE-2022-0453, CVE-2022-0454, CVE-2022-0455,
CVE-2022-0456, CVE-2022-0457, CVE-2022-0458, CVE-2022-0459,
CVE-2022-0460, CVE-2022-0461, CVE-2022-0462, CVE-2022-0463,
CVE-2022-0464, CVE-2022-0465, CVE-2022-0466, CVE-2022-0467,
CVE-2022-0468, CVE-2022-0469, CVE-2022-0470
- Complete Opera 84.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-84/
- Update to 83.0.4254.54
- DNA-96581 Fast tab tooltip doesn���t always show related sites with
scrollable tab strip
- DNA-96608 Cannot drag a tab to create a new window
- DNA-96657 Do not make tab tooltip hoverable if there���s no list of
tabs
- DNA-97291 Crash at
opera::flow::FlowSessionImpl::RegisterDevice(base::OnceCallback)
- DNA-97468 Incorrect number of restored tabs when video-popout is
detached
- DNA-97476 Add retry to stapling during signing
- DNA-97609 Failing MetricsReporterTest.TimeSpent* smoketests
- Update to 83.0.4254.27
- CHR-8737 Update chromium on desktop-stable-97-4254 to 97.0.4692.99
- DNA-96336 [Mac] Translate new network installer slogan
- DNA-96678 Add battery level monitoring capability to powerSavePrivate
- DNA-96939 Crash at
opera::ExternalVideoService::MarkAsManuallyClosed()
- DNA-97276 Enable #static-tab-audio-indicator on all streams
- The update to chromium 97.0.4692.99 fixes following issues:
CVE-2022-0289, CVE-2022-0290, CVE-2022-0291, CVE-2022-0292,
CVE-2022-0293, CVE-2022-0294, CVE-2022-0295, CVE-2022-0296,
CVE-2022-0297, CVE-2022-0298, CVE-2022-0300, CVE-2022-0301,
CVE-2022-0302, CVE-2022-0304, CVE-2022-0305, CVE-2022-0306,
CVE-2022-0307, CVE-2022-0308, CVE-2022-0309, CVE-2022-0310, CVE-2022-0311
- Update to 83.0.4254.19
- DNA-96079 Turn on #automatic-video-popout on developer
- DNA-97070 Opera 83 translations
- DNA-97119 [LastCard] Stop showing used burner cards
- DNA-97131 Enable automatic-video-popout on all streams from O84 on
- DNA-97257 Crash at views::ImageButton::SetMinimumImageSize(gfx::Size
const&)
- DNA-97259 Promote O83 to stable
- Complete Opera 83.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-83/
- Update to 83.0.4254.16
- DNA-96968 Fix alignment of the 'Advanced' button in Settings
- Update to 83.0.4254.14
- CHR-8701 Update chromium on desktop-stable-97-4254 to 97.0.4692.45
- CHR-8713 Update chromium on desktop-stable-97-4254 to 97.0.4692.56
- CHR-8723 Update chromium on desktop-stable-97-4254 to 97.0.4692.71
- DNA-96780 Crash at
ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)
- DNA-96822 Tab close resize behavior change
- DNA-96861 Create Loomi Options menu
- DNA-96904 Support Win11 snap layout popup
- DNA-96951 Tab close animation broken
- DNA-96991 Tab X button doesn���t work correctly
- DNA-97027 Incorrect tab size after tab close
- The update to chromium 97.0.4692.71 fixes following issues:
CVE-2022-0096, CVE-2022-0097, CVE-2022-0098, CVE-2022-0099,
CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103,
CVE-2022-0104, CVE-2022-0105, CVE-2022-0105, CVE-2022-0106,
CVE-2022-0107, CVE-2022-0108, CVE-2022-0109, CVE-2022-0110,
CVE-2022-0111, CVE-2022-0111, CVE-2022-0112, CVE-2022-0113,
CVE-2022-0114, CVE-2022-0115, CVE-2022-0116, CVE-2022-0117,
CVE-2022-0118, CVE-2022-0120
- Update to version 82.0.4227.58
- DNA-96780 Crash at
ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)
- DNA-96890 Settings default browser not working for current user on
Windows 7
- Update to version 82.0.4227.43
- CHR-8705 Update chromium on desktop-stable-96-4227 to 96.0.4664.110
- DNA-93284 Unstable
obj/opera/desktop/common/installer_rc_generated/installer.res
- DNA-95908 Interstitial/internal pages shown as NOT SECURE after
visiting http site
- DNA-96404 Opera doesn���t show on main screen when second screen is
abruptly disconnected
- The update to chromium 96.0.4664.110 fixes following issues:
CVE-2021-4098, CVE-2021-4099, CVE-2021-4100, CVE-2021-4101, CVE-2021-4102
- Update to version 82.0.4227.33
- CHR-8689 Update chromium on desktop-stable-96-4227 to 96.0.4664.93
- DNA-96559 Tooltip popup looks bad in dark theme
- DNA-96570 [Player] Tidal logging in via PLAY doesn���t work
- DNA-96594 Unnecessary extra space in fullscreen mode on M1 Pro MacBooks
- DNA-96649 Update Meme button
- DNA-96676 Add Icon in the Sidebar Setup
- DNA-96677 Add default URL
- The update to chromium 96.0.4664.93 fixes following issues:
CVE-2021-4052, CVE-2021-4053, CVE-2021-4079, CVE-2021-4054,
CVE-2021-4078, CVE-2021-4055, CVE-2021-4056, CVE-2021-4057,
CVE-2021-4058, CVE-2021-4059, CVE-2021-4061, CVE-2021-4062,
CVE-2021-4063, CVE-2021-4064, CVE-2021-4065, CVE-2021-4066,
CVE-2021-4067, CVE-2021-4068
- Update to version 82.0.4227.23
- DNA-95632 With new au-logic UUID is set with delay and may be not set
for pb-builds (when closing fast)
- DNA-96349 Laggy tooltip animation
- DNA-96483 [Snap][Linux] Video not working / wrong ffmpeg snap version
for Opera 82
- DNA-96493 Create 'small' enticement in credit card autofill
- DNA-96533 Opera 82 translations
- DNA-96535 Make the URL configurable
- DNA-96553 Add switch to whitelist test pages
- DNA-96557 Links not opened from panel
- DNA-96558 AdBlock bloks some trackers inside the panel
- DNA-96568 [Player] Tidal in sidebar Player opens wrong site when
logging in
- DNA-96659 Siteprefs not applied after network service crash
- DNA-96593 Promote O82 to stable
- Complete Opera 82.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-82/
- Update to version 82.0.4227.13
- CHR-8668 Update chromium on desktop-stable-96-4227 to 96.0.4664.45
- DNA-76987 [Mac] Update desktop EULA with geolocation split
- DNA-93388 Problem with symlinks on windows when creating file list
- DNA-95734 Discarded Recently Closed items get revived after restart
- DNA-96134 "Your profile has been updated" does not disappear
- DNA-96190 Opera freezes when trying to drag expanded bookmark folder
with nested subfolders
- DNA-96223 Easy Files not working in Full Screen
- DNA-96274 Checkout autofill shouldn't show used burner card
- DNA-96275 Change the notification message for pausing multi-use cards
- DNA-96295 "Video pop out" setting doesn't sync
- DNA-96316 Highlight text wrong colour on dark mode
- DNA-96326 Wrong translation Private Mode > Turkish
- DNA-96351 macOS window controls are missing in full screen
- DNA-96440 Update video URL
- DNA-96448 add option to pin extension via rich hints
- DNA-96453 Register user-chosen option on client-side, read on hint side
- DNA-96454 Choosing an option from the settings menu should close the
popup
- DNA-96484 Enable AB test for a new autoupdater logic (for 50%)
- DNA-96500 Add "don't show me again" prefs to allowed whitelist
- DNA-96538 Inline audiocomplete for www.mediaexpert.pl incorrectly
suggested
- The update to chromium 96.0.4664.45 fixes following issues:
CVE-2021-38005, CVE-2021-38006, CVE-2021-38007, CVE-2021-38008,
CVE-2021-38009, CVE-2021-38010, CVE-2021-38011, CVE-2021-38012,
CVE-2021-38013, CVE-2021-38014, CVE-2021-38015, CVE-2021-38016,
CVE-2021-38017, CVE-2021-38019, CVE-2021-38020, CVE-2021-38021,
CVE-2021-38022
- Update to version 81.0.4196.54
- CHR-8644 Update chromium on desktop-stable-95-4196 to 95.0.4638.69
- DNA-95773 ExtensionWebRequestApiTest crashes on mac
- DNA-96062 Opera 81 translations
- DNA-96134 ���Your profile has been updated��� does not disappear
- DNA-96274 Checkout autofill shouldn���t show used burner card
- DNA-96275 Change the notification message for pausing multi-use cards
- DNA-96440 Update video URL
- The update to chromium 95.0.4638.69 fixes following issues:
CVE-2021-37997, CVE-2021-37998, CVE-2021-37999, CVE-2021-37980,
CVE-2021-38001, CVE-2021-38002, CVE-2021-38003, CVE-2021-38004
- Update to version 81.0.4196.37
- DNA-96008 Crash at
content::WebContentsImpl::OpenURL(content::OpenURLParams const&)
- DNA-96032 Closing the videoconference pop-up force leaving the meeting
- DNA-96092 Crash at void
opera::ModalDialogViews::OnWidgetClosing(opera::ModalDialog::Result)
- DNA-96142 [Yat] Emoji icon cut off in URL for Yat
- Update to version 81.0.4196.31
- DNA-95733 Implement the ���Manage��� menu in card details view
- DNA-95736 Update UI for paused card
- DNA-95791 Crash at base::operator<
- DNA-95794 Sometimes the sidebar UI fails to load
- DNA-95812 Retrieve cards info when showing autofill
- DNA-96035 Cannot create virtual card on Sandbox environment
- DNA-96147 ���Buy��� button does not work
- DNA-96168 Update contributors list
- DNA-96211 Enable #fast-tab-tooltip on all streams
- DNA-96231 Promote O81 to stable
- Complete Opera 80.1 changelog at:
https://blogs.opera.com/desktop/changelog-for-81/
- Update to version 81.0.4196.27
- CHR-8623 Update chromium on desktop-stable-95-4196 to 95.0.4638.54
- DNA-92384 Better segmenting of hint users
- DNA-95523 Allow sorting in multi-card view
- DNA-95659 Flow of Lastcard on first login
- DNA-95735 Implement the button that reveals full card details
- DNA-95747 Better way to handle expired funding card
- DNA-95949 [Mac Retina] Clicking active tab should scroll to the top
- DNA-95993 Update icon used for Yat in address bar dropdown
- DNA-96021 Cleared download item view is never deleted
- DNA-96036 Occupation field in 'Account ��� Edit' is shown twice
- DNA-96127 Upgrade plan button does nothing
- DNA-96138 "Add Card" button does not change to "Upgrade Plan" after
adding card
- The update to chromium 95.0.4638.54 fixes following issues:
CVE-2021-37981, CVE-2021-37982, CVE-2021-37983, CVE-2021-37984,
CVE-2021-37985, CVE-2021-37986, CVE-2021-37987, CVE-2021-37988,
CVE-2021-37989, CVE-2021-37990, CVE-2021-37991, CVE-2021-37992,
CVE-2021-37993, CVE-2021-37994, CVE-2021-37995, CVE-2021-37996
- Update to version 80.0.4170.72
- DNA-95522 Change card view to show all types of cards
- DNA-95523 Allow sorting in multi-card view
- DNA-95524 Allow searching for cards by name
- DNA-95658 Allow user to add a card
- DNA-95659 Flow of Lastcard on first login
- DNA-95660 Implement editing card details
- DNA-95699 Add card details view
- DNA-95733 Implement the ���Manage��� menu in card details view
- DNA-95735 Implement the button that reveals full card details
- DNA-95736 Update UI for paused card
- DNA-95747 Better way to handle expired funding card
- DNA-95794 Sometimes the sidebar UI fails to load
- DNA-95812 Retrieve cards info when showing autofill
- DNA-96036 Occupation field in ���Account ��� Edit��� is shown twice
- DNA-96127 Upgrade plan button does nothing
- DNA-96138 ���Add Card��� button does not change to ���Upgrade Plan���
after adding card
- Update to version 80.0.4170.63
- CHR-8612 Update chromium on desktop-stable-94-4170 to 94.0.4606.81
- DNA-95434 Crash at opera::ThemesService::UpdateCurrentTheme()
- The update to chromium 94.0.4606.81 fixes following issues:
CVE-2021-37977, CVE-2021-37978, CVE-2021-37979, CVE-2021-37980
- Update to version 80.0.4170.40
- CHR-8598 Update chromium on desktop-stable-94-4170 to 94.0.4606.71
- DNA-95221 Emoji button stuck in address bar
- DNA-95325 Make y.at navigations to be reported with page_views events
- DNA-95327 Add ���Emojis��� context menu option in address bar field
- DNA-95339 Add YAT emoji url suggestion to search�� dialog
- DNA-95416 Remove emoji button from address bar
- DNA-95439 Enable #yat-emoji-addresses on developer stream
- DNA-95441 [Mac big sur] Emoji are not shown in address bar url
- DNA-95514 Crash at resource_coordinator::TabLifecycleUnitSource
::TabLifecycleUnit::OnLifecycleUnitStateChanged(mojom::
LifecycleUnitState, mojom::LifecycleUnitStateChangeReason)
- DNA-95746 Enable #reader-mode everywhere
- DNA-95865 Numbers are recognized as emojis
- DNA-95866 Change Yat text in selection popup
- DNA-95867 Show that buttons are clickable in selection popup
- The update to chromium 94.0.4606.71 fixes following issues:
CVE-2021-37974, CVE-2021-37975, CVE-2021-37976
- Update to version 80.0.4170.16
- CHR-8590 Update chromium on desktop-stable-94-4170 to 94.0.4606.61
- DNA-95347 Make InstallerStep::Run async
- DNA-95420 First suggestion in address field is often not highlighted
- DNA-95613 Browser closing itself after closing SD/first tab and last
opened tab
- DNA-95725 Promote O80 to stable
- DNA-95781 Import fixes for CVE-2021-37975, CVE-2021-37976 and
CVE-2021-37974 to desktop-stable-94-4170
- Complete Opera 80.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-80/
- Drop Provides/Obsoletes for opera-gtk and opera-kde4
opera-gtk and opera-kde4 were last used in openSUSE 13.1
- Drop post/postun for desktop_database_post and icon_theme_cache_post
because were last used before
openSUSE 15.0
- Update to version 79.0.4143.72
- DNA-94933 Add emoji panel to address bar
- DNA-95210 Add emoji YAT address bar suggestions
- DNA-95221 Emoji button stuck in address bar
- DNA-95325 Make y.at navigations to be reported with page_views events
- DNA-95327 Add ���Emojis��� context menu option in address bar field
- DNA-95339 Add YAT emoji url suggestion to search�� dialog
- DNA-95364 Add browser feature flag
- DNA-95416 Remove emoji button from address bar
- DNA-95439 Enable #yat-emoji-addresses on developer stream
- DNA-95441 [Mac big sur] Emoji are not shown in address bar url
- DNA-95445 Crash when removing unsynced pinboard bookmark with sync
enabled
- DNA-95512 Allow to show title and timer for simple banners
- DNA-95516 Wrong label in settings for themes
- DNA-95679 Temporarily disable AB test for a new autoupdater logic
- Update to version 79.0.4143.50
- CHR-8571 Update chromium on desktop-stable-93-4143 to 93.0.4577.82
- DNA-94104 ContinueShoppingOnEbayBrowserTest.ShouldDisplayOffers
TilesStartingWithMostActiveOnes fails
- DNA-94894 [Rich Hint] Agent API permissions
- DNA-94989 Wrong color and appearance of subpages in the settings
- DNA-95241 ���Switch to tab��� button is visible only on hover
- DNA-95286 Add unit tests to pinboard sync related logic in browser
- DNA-95372 [Mac retina screen] Snapshot doesnt capture cropped area
- DNA-95526 Some webstore extensions are not verified properly
- The update to chromium 93.0.4577.82 fixes following issues:
CVE-2021-30625, CVE-2021-30626, CVE-2021-30627, CVE-2021-30628,
CVE-2021-30629, CVE-2021-30630, CVE-2021-30631, CVE-2021-30632,
CVE-2021-30633
- Update to version 79.0.4143.22
- CHR-8550 Update chromium on desktop-stable-93-4143 to 93.0.4577.58
- CHR-8557 Update chromium on desktop-stable-93-4143 to 93.0.4577.63
- DNA-94641 [Linux] Proprietary media codecs not working in snap builds
- DNA-95076 [Linux] Page crash with media content
- DNA-95084 [Mac] Cannot quit through menu with snapshot editor open
- DNA-95138 Add setting to synchronize Pinboards
- DNA-95157 Crash at -[OperaCrApplication sendEvent:]
- DNA-95204 Opera 79 translations
- DNA-95240 The pinboard thumbnail cannot be generated anymore
- DNA-95278 Existing Pinboards might be missing
- DNA-95292 Enable #bookmarks-trash-cleaner on all streams
- DNA-95293 Enable #easy-files-downloads-folder on all streams
- DNA-95383 Promote O79 to stable
- Complete Opera 79.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-79/
- The update to chromium 93.0.4577.58 fixes following issues:
CVE-2021-30606, CVE-2021-30607, CVE-2021-30608, CVE-2021-30609,
CVE-2021-30610, CVE-2021-30611, CVE-2021-30612, CVE-2021-30613,
CVE-2021-30614, CVE-2021-30615, CVE-2021-30616, CVE-2021-30617,
CVE-2021-30618, CVE-2021-30619, CVE-2021-30620, CVE-2021-30621,
CVE-2021-30622, CVE-2021-30623, CVE-2021-30624
- Update to version 78.0.4093.184
- CHR-8533 Update chromium on desktop-stable-92-4093 to 92.0.4515.159
- DNA-93472 Reattaching to other browsers
- DNA-93741 Multiple hint slots
- DNA-93742 Allow displaying unobtrusive external hints
- DNA-93744 Add slots in toolbar action view
- DNA-94230 Improve text contrast for Speed Dials
- DNA-94724 [Mac] Add macOS dark theme wallpaper with easy setup
- DNA-94786 Crash at base::SupportsUserData:: SetUserData(void const*,
std::__1::unique_ptr)
- DNA-94807 Allow scripts access opera version and product info
- DNA-94862 Continue on shopping Amazon doesn���t work correct
- DNA-94870 Add an addonsPrivate function to install with permissions
dialog first
- DNA-95064 Revert DNA-93714 on stable
- The update to chromium 92.0.4515.159 fixes following issues:
CVE-2021-30598, CVE-2021-30599, CVE-2021-30600, CVE-2021-30601,
CVE-2021-30602, CVE-2021-30603, CVE-2021-30604
- Update to version 78.0.4093.147
- CHR-8251 Update chromium on desktop-stable-92-4093 to 92.0.4515.131
- DNA-93036 Opera not starting after closing window. Processes still
working.
- DNA-94516 Add ���Detach tab��� entry to tab menu
- DNA-94584 [Mac] Sidebar setup not closed after press ���Add
extensions��� button
- DNA-94761 Crash when trying to record ���Chrome developer��� trace
- DNA-94790 Crash at opera::VideoConferenceTabDetachController::
OnBrowserAboutToStartClosing(Browser*)
- The update to chromium 92.0.4515.131 fixes following issues:
CVE-2021-30590, CVE-2021-30591, CVE-2021-30592, CVE-2021-30593,
CVE-2021-30594, CVE-2021-30596, CVE-2021-30597
- Update to version 78.0.4093.112
- DNA-94466 Implement sorting Pinboards in overview
- DNA-94582 Add access to APIs for showing pinboard icon in sidebar
- DNA-94603 Suspicious pinboards events
- DNA-94625 Disable opr.pinboardPrivate.getThumbnail() for local files
- DNA-94640 Promote O78 to stable
- DNA-94661 Missing translations for some languages
- Complete Opera 78.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-78/
- Update to version 77.0.4054.277
- CHR-8502 Update chromium on desktop-stable-91-4054 to 91.0.4472.164
- DNA-94291 Video conference popout doesnt remember its size after
resizing
- DNA-94399 Incorrect icon for wp.pl in address bar dropdown
- DNA-94462 Low quality of default wallpaper on windows
- The update to chromium 91.0.4472.164 fixes following issues:
CVE-2021-30541, CVE-2021-30560, CVE-2021-30561, CVE-2021-30562,
CVE-2021-30563, CVE-2021-30564
- Update to version 77.0.4054.254
- DNA-92344 Windows 10 Implementation
- DNA-92486 Replace ��� icon with ���settings��� icon
- DNA-92487 Close individual item
- DNA-92496 Create separate entry in settings for BABE
- DNA-93275 Implement cycles size according to design
- DNA-93280 The system theme has only half a checkmark
- DNA-93728 Whatsapp notification is not refreshed
- DNA-94047 Remove pinboard WebUI integration
- DNA-94118 Write test for ThumbnailTabHelper changes in DNA-94100
- DNA-94120 Fix Welcome popup layout
- DNA-94140 Crash at base::TaskRunner ::PostTask(base::Location const&,
base::OnceCallback)
- DNA-94205 Consider setting pinboard display URL in
address_field_helper.cc
- DNA-94211 Easy Files don���t show thumbnails
- DNA-94309 Pinboards URLs don���t get lighter color treatment
- DNA-94318 Wrong ���Transparency��� word translation in Swedish
- DNA-94321 AB test: google suggestions on top ��� bigger test
- DNA-94341 Make pinboard popup testable on web page
- DNA-94381 Disabling Pinboards doesn���t remove item from menu / sidebar
- DNA-94392 Add u2f-devices interface to snap packages
- DNA-94461 Enable #system-theme on all streams
- Update to version 77.0.4054.203
- CHR-8475 Update chromium on desktop-stable-91-4054 to 91.0.4472.124
- DNA-93523 Crash at extensions::TabHelper::WebContentsDestroyed()
- DNA-93917 Upload snap to edge while preparing repository package
- DNA-94157 Crash at gfx::ICCProfile::operator=(gfx::ICCProfile const&)
- DNA-94159 Crash at
opera::auth::AuthAccountServiceImpl::GetAuthAccount()
- DNA-94161 [Add tabs]Unexpected symbols instead of Workspace name
- DNA-94241 Implement better process killing for timeout
- DNA-94248 Allow retry on tests that timed-out
- DNA-94251 heap-use-after-free in VideoConference
- DNA-94315 Crash at class std::__1::basic_string ui::ResourceBundle::
LoadLocaleResources(const class std::__1::basic_string& const, bool)
- DNA-94357 Fix issue in scripts
- Update to version 77.0.4054.172
- DNA-93078 Do not display ���share tab��� sliding toolbar on detached
tab
- DNA-93358 The red underline extends beyond the Google meets conference
tab outline
- DNA-93404 Crash in test when destroying BABE���s webcontents
- DNA-93637 ctrl+9 shortcut is inconsistent with other browsers
- DNA-93661 Add opauto test to cover new shortcut from DNA-93637
- DNA-93867 Use version from package instead of repository
- DNA-93993 Pinboard translations from Master
- DNA-94099 Increase new-autoupdater-logic AB test to cover 50% of new
installations
- DNA-94100 Thumbnail doesn���t update
- DNA-94178 Automatic popout should not happen after manually closing a
popout
- Update to version 77.0.4054.146
- CHR-8458 Update chromium on desktop-stable-91-4054 to 91.0.4472.114
- DNA-92171 Create active linkdiscovery service
- DNA-92388 Fix and unskip
WorkspacesEmoji.testChooseEmojiAsWorkspaceIcon when possible
- DNA-93101 Tabs are being snoozed when tab snoozing is disabled
- DNA-93386 Update pinboard view when item changes
- DNA-93448 Make browser ready for Developer release
- DNA-93491 Fix failing tests after enabling #pinboard flag
- DNA-93498 Add additional music services
- DNA-93503 Blank popup on clicking toolbar icon with popup open
- DNA-93561 Do not allow zoom different from 100% in Pinboard popup
- DNA-93637 ctrl+9 shortcut is inconsistent with other browsers
- DNA-93644 Create route for `import open tabs` to `pinboard`
- DNA-93664 Adapt popup to design
- DNA-93702 Turn on flags on developer
- DNA-93737 [Pinboard] Remove Mock API
- DNA-93745 Unable to open the popup after opening it several times
- DNA-93776 Popup closes and reopens when clicking the toolbar button
- DNA-93786 DCHECK after opening popup
- DNA-93802 Crash at views::Widget::GetNativeView() const
- DNA-93810 Add pinboard icon to sidebar
- DNA-93825 Add pinboard to Opera menu
- DNA-93833 [Player] Implement seeking for new services
- DNA-93845 Do not log output of snapcraft on console
- DNA-93864 Create feature flag for start page sync banner
- DNA-93865 Implement start page banner
- DNA-93867 Use version from package instead of repository
- DNA-93878 [Player] Crash when current player service becomes
unavailable when user location changes
- DNA-93953 ���Send image to Pinboard��� has the wrong position in the
context menu
- DNA-93987 Disable zooming popup contents like in other popups
- DNA-93989 Change internal URL to opera://pinboards
- DNA-93990 Update strings to reflect new standards
- DNA-93992 Add Pinboards to Opera settings
- DNA-93993 Pinboard translations from Master
- DNA-94011 Enable feature flags for Reborn 5 on stable
- DNA-94019 Add a direct link to settings
- DNA-94088 Internal pages provoke not saving other pages to the Pinboard
- DNA-94111 [O77] Sidebar setup does not open
- DNA-94139 Crash at
opera::(anonymous namespace)::PinboardPopupWebView::RemovedFromWidget()
- The update to chromium 91.0.4472.114 fixes following issues:
CVE-2021-30554, CVE-2021-30555, CVE-2021-30556, CVE-2021-30557
- Update to version 77.0.4054.90
- CHR-8446 Update chromium on desktop-stable-91-4054 to 91.0.4472.101
- The update to chromium 91.0.4472.101 fixes following issues:
CVE-2021-30544, CVE-2021-30545, CVE-2021-30546, CVE-2021-30547,
CVE-2021-30548, CVE-2021-30549, CVE-2021-30550, CVE-2021-30551,
CVE-2021-30552, CVE-2021-30553
- Update to version 77.0.4054.80
- DNA-93656 Active cards in checkout Auto-fill
- DNA-93805 Create snap packages in buildsign
- DNA-93823 archive_opera_snap failures on Linux
- DNA-93844 Fix AttributeError in package_type.py
- Update to version 77.0.4054.64
- DNA-93159 Implement image(preview) of each created pinboard
- DNA-93273 ���Send image to Pinboard��� doesn���t work correct on
staging server
- DNA-93277 Add/update opauto tests for the System Theme WP1
implementation p.1
- DNA-93286 [BigSur] YT not being reloaded when opened from link
- DNA-93296 Opera 77 translations
- DNA-93372 Build new edition for Axel Springer
- DNA-93376 Write unittests for PinboardImageCollector
- DNA-93401 [LastCard] Do not change user state if not needed
- DNA-93409 Animation with hat and glasses is missing in Private mode
- DNA-93443 API opr.pinboardPrivate.getThumbnail() returns
old thumbnail image
- DNA-93509 Add Opera switch for pinboard staging backend and use it for
tests
- DNA-93519 [Sidebar] WhatsApp ���Log out��� doesn���t work
- DNA-93634 Fix errors in Slovak translations
- DNA-93724 Some webstore extensions are not verified properly
- Complete Opera 77.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-77/
- Update to version 76.0.4017.177
- DNA-92597 Sound controller doesn���t work after pressing ���Next���
button
- DNA-93405 Import vmp_signer instead of starting new python process
- DNA-93406 [Mac] Import plist_util instead of calling script in
_generateAppEntitlements
- DNA-93442 Make GX Control panel attachable by webdriver
- DNA-93554 [AdBlock] Find a fix for blocking ���new��� YouTube ads
- DNA-93587 Pre-refactor solution
- Update to version 76.0.4017.154
- CHR-8420 Update chromium on desktop-stable-90-4017 to 90.0.4430.212
- DNA-92411 Bookmarks breadcrumbs wrong color when pressed in dark mode
- DNA-92587 Sync settings: ���Use old password��� button doesn���t work
- DNA-92672 Make it possible for agent to inject scripts into startpage
- DNA-92712 Add SD reload API
- DNA-93190 The bookmark can���t be opened in Workspace 5-6
- DNA-93247 Reopen last closed tab shortcut opens random tab on new
window
- DNA-93294 Binary diff for opera_browser.dll is not created on 32-bit
builds
- DNA-93313 Add opauto test to cover DNA-93190
- DNA-93368 Fix an error in Polish translation
- DNA-93408 [Windows] widevine_cdm_component_installer does not compile
on desktop-stable-90-4017
- The update to chromium 90.0.4430.212 fixes following issues:
CVE-2021-30506, CVE-2021-30507, CVE-2021-30508, CVE-2021-30509,
CVE-2021-30510, CVE-2021-30511, CVE-2021-30512, CVE-2021-30513,
CVE-2021-30514, CVE-2021-30515, CVE-2021-30516, CVE-2021-30517,
CVE-2021-30518, CVE-2021-30519, CVE-2021-30520
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:NonFree:
zypper in -t patch openSUSE-2022-110=1
Package List:
- openSUSE Leap 15.4:NonFree (x86_64):
opera-85.0.4341.28-lp154.2.5.1
References:
https://www.suse.com/security/cve/CVE-2021-30506.html
https://www.suse.com/security/cve/CVE-2021-30507.html
https://www.suse.com/security/cve/CVE-2021-30508.html
https://www.suse.com/security/cve/CVE-2021-30509.html
https://www.suse.com/security/cve/CVE-2021-30510.html
https://www.suse.com/security/cve/CVE-2021-30511.html
https://www.suse.com/security/cve/CVE-2021-30512.html
https://www.suse.com/security/cve/CVE-2021-30513.html
https://www.suse.com/security/cve/CVE-2021-30514.html
https://www.suse.com/security/cve/CVE-2021-30515.html
https://www.suse.com/security/cve/CVE-2021-30516.html
https://www.suse.com/security/cve/CVE-2021-30517.html
https://www.suse.com/security/cve/CVE-2021-30518.html
https://www.suse.com/security/cve/CVE-2021-30519.html
https://www.suse.com/security/cve/CVE-2021-30520.html
https://www.suse.com/security/cve/CVE-2021-30541.html
https://www.suse.com/security/cve/CVE-2021-30544.html
https://www.suse.com/security/cve/CVE-2021-30545.html
https://www.suse.com/security/cve/CVE-2021-30546.html
https://www.suse.com/security/cve/CVE-2021-30547.html
https://www.suse.com/security/cve/CVE-2021-30548.html
https://www.suse.com/security/cve/CVE-2021-30549.html
https://www.suse.com/security/cve/CVE-2021-30550.html
https://www.suse.com/security/cve/CVE-2021-30551.html
https://www.suse.com/security/cve/CVE-2021-30552.html
https://www.suse.com/security/cve/CVE-2021-30553.html
https://www.suse.com/security/cve/CVE-2021-30554.html
https://www.suse.com/security/cve/CVE-2021-30555.html
https://www.suse.com/security/cve/CVE-2021-30556.html
https://www.suse.com/security/cve/CVE-2021-30557.html
https://www.suse.com/security/cve/CVE-2021-30560.html
https://www.suse.com/security/cve/CVE-2021-30561.html
https://www.suse.com/security/cve/CVE-2021-30562.html
https://www.suse.com/security/cve/CVE-2021-30563.html
https://www.suse.com/security/cve/CVE-2021-30564.html
https://www.suse.com/security/cve/CVE-2021-30590.html
https://www.suse.com/security/cve/CVE-2021-30591.html
https://www.suse.com/security/cve/CVE-2021-30592.html
https://www.suse.com/security/cve/CVE-2021-30593.html
https://www.suse.com/security/cve/CVE-2021-30594.html
https://www.suse.com/security/cve/CVE-2021-30596.html
https://www.suse.com/security/cve/CVE-2021-30597.html
https://www.suse.com/security/cve/CVE-2021-30598.html
https://www.suse.com/security/cve/CVE-2021-30599.html
https://www.suse.com/security/cve/CVE-2021-30600.html
https://www.suse.com/security/cve/CVE-2021-30601.html
https://www.suse.com/security/cve/CVE-2021-30602.html
https://www.suse.com/security/cve/CVE-2021-30603.html
https://www.suse.com/security/cve/CVE-2021-30604.html
https://www.suse.com/security/cve/CVE-2021-30606.html
https://www.suse.com/security/cve/CVE-2021-30607.html
https://www.suse.com/security/cve/CVE-2021-30608.html
https://www.suse.com/security/cve/CVE-2021-30609.html
https://www.suse.com/security/cve/CVE-2021-30610.html
https://www.suse.com/security/cve/CVE-2021-30611.html
https://www.suse.com/security/cve/CVE-2021-30612.html
https://www.suse.com/security/cve/CVE-2021-30613.html
https://www.suse.com/security/cve/CVE-2021-30614.html
https://www.suse.com/security/cve/CVE-2021-30615.html
https://www.suse.com/security/cve/CVE-2021-30616.html
https://www.suse.com/security/cve/CVE-2021-30617.html
https://www.suse.com/security/cve/CVE-2021-30618.html
https://www.suse.com/security/cve/CVE-2021-30619.html
https://www.suse.com/security/cve/CVE-2021-30620.html
https://www.suse.com/security/cve/CVE-2021-30621.html
https://www.suse.com/security/cve/CVE-2021-30622.html
https://www.suse.com/security/cve/CVE-2021-30623.html
https://www.suse.com/security/cve/CVE-2021-30624.html
https://www.suse.com/security/cve/CVE-2021-30625.html
https://www.suse.com/security/cve/CVE-2021-30626.html
https://www.suse.com/security/cve/CVE-2021-30627.html
https://www.suse.com/security/cve/CVE-2021-30628.html
https://www.suse.com/security/cve/CVE-2021-30629.html
https://www.suse.com/security/cve/CVE-2021-30630.html
https://www.suse.com/security/cve/CVE-2021-30631.html
https://www.suse.com/security/cve/CVE-2021-30632.html
https://www.suse.com/security/cve/CVE-2021-30633.html
https://www.suse.com/security/cve/CVE-2021-37974.html
https://www.suse.com/security/cve/CVE-2021-37975.html
https://www.suse.com/security/cve/CVE-2021-37976.html
https://www.suse.com/security/cve/CVE-2021-37977.html
https://www.suse.com/security/cve/CVE-2021-37978.html
https://www.suse.com/security/cve/CVE-2021-37979.html
https://www.suse.com/security/cve/CVE-2021-37980.html
https://www.suse.com/security/cve/CVE-2021-37981.html
https://www.suse.com/security/cve/CVE-2021-37982.html
https://www.suse.com/security/cve/CVE-2021-37983.html
https://www.suse.com/security/cve/CVE-2021-37984.html
https://www.suse.com/security/cve/CVE-2021-37985.html
https://www.suse.com/security/cve/CVE-2021-37986.html
https://www.suse.com/security/cve/CVE-2021-37987.html
https://www.suse.com/security/cve/CVE-2021-37988.html
https://www.suse.com/security/cve/CVE-2021-37989.html
https://www.suse.com/security/cve/CVE-2021-37990.html
https://www.suse.com/security/cve/CVE-2021-37991.html
https://www.suse.com/security/cve/CVE-2021-37992.html
https://www.suse.com/security/cve/CVE-2021-37993.html
https://www.suse.com/security/cve/CVE-2021-37994.html
https://www.suse.com/security/cve/CVE-2021-37995.html
https://www.suse.com/security/cve/CVE-2021-37996.html
https://www.suse.com/security/cve/CVE-2021-37997.html
https://www.suse.com/security/cve/CVE-2021-37998.html
https://www.suse.com/security/cve/CVE-2021-37999.html
https://www.suse.com/security/cve/CVE-2021-38001.html
https://www.suse.com/security/cve/CVE-2021-38002.html
https://www.suse.com/security/cve/CVE-2021-38003.html
https://www.suse.com/security/cve/CVE-2021-38004.html
https://www.suse.com/security/cve/CVE-2021-38005.html
https://www.suse.com/security/cve/CVE-2021-38006.html
https://www.suse.com/security/cve/CVE-2021-38007.html
https://www.suse.com/security/cve/CVE-2021-38008.html
https://www.suse.com/security/cve/CVE-2021-38009.html
https://www.suse.com/security/cve/CVE-2021-38010.html
https://www.suse.com/security/cve/CVE-2021-38011.html
https://www.suse.com/security/cve/CVE-2021-38012.html
https://www.suse.com/security/cve/CVE-2021-38013.html
https://www.suse.com/security/cve/CVE-2021-38014.html
https://www.suse.com/security/cve/CVE-2021-38015.html
https://www.suse.com/security/cve/CVE-2021-38016.html
https://www.suse.com/security/cve/CVE-2021-38017.html
https://www.suse.com/security/cve/CVE-2021-38019.html
https://www.suse.com/security/cve/CVE-2021-38020.html
https://www.suse.com/security/cve/CVE-2021-38021.html
https://www.suse.com/security/cve/CVE-2021-38022.html
https://www.suse.com/security/cve/CVE-2021-4052.html
https://www.suse.com/security/cve/CVE-2021-4053.html
https://www.suse.com/security/cve/CVE-2021-4054.html
https://www.suse.com/security/cve/CVE-2021-4055.html
https://www.suse.com/security/cve/CVE-2021-4056.html
https://www.suse.com/security/cve/CVE-2021-4057.html
https://www.suse.com/security/cve/CVE-2021-4058.html
https://www.suse.com/security/cve/CVE-2021-4059.html
https://www.suse.com/security/cve/CVE-2021-4061.html
https://www.suse.com/security/cve/CVE-2021-4062.html
https://www.suse.com/security/cve/CVE-2021-4063.html
https://www.suse.com/security/cve/CVE-2021-4064.html
https://www.suse.com/security/cve/CVE-2021-4065.html
https://www.suse.com/security/cve/CVE-2021-4066.html
https://www.suse.com/security/cve/CVE-2021-4067.html
https://www.suse.com/security/cve/CVE-2021-4068.html
https://www.suse.com/security/cve/CVE-2021-4078.html
https://www.suse.com/security/cve/CVE-2021-4079.html
https://www.suse.com/security/cve/CVE-2021-4098.html
https://www.suse.com/security/cve/CVE-2021-4099.html
https://www.suse.com/security/cve/CVE-2021-4100.html
https://www.suse.com/security/cve/CVE-2021-4101.html
https://www.suse.com/security/cve/CVE-2021-4102.html
https://www.suse.com/security/cve/CVE-2022-0096.html
https://www.suse.com/security/cve/CVE-2022-0097.html
https://www.suse.com/security/cve/CVE-2022-0098.html
https://www.suse.com/security/cve/CVE-2022-0099.html
https://www.suse.com/security/cve/CVE-2022-0100.html
https://www.suse.com/security/cve/CVE-2022-0101.html
https://www.suse.com/security/cve/CVE-2022-0102.html
https://www.suse.com/security/cve/CVE-2022-0103.html
https://www.suse.com/security/cve/CVE-2022-0104.html
https://www.suse.com/security/cve/CVE-2022-0105.html
https://www.suse.com/security/cve/CVE-2022-0106.html
https://www.suse.com/security/cve/CVE-2022-0107.html
https://www.suse.com/security/cve/CVE-2022-0108.html
https://www.suse.com/security/cve/CVE-2022-0109.html
https://www.suse.com/security/cve/CVE-2022-0110.html
https://www.suse.com/security/cve/CVE-2022-0111.html
https://www.suse.com/security/cve/CVE-2022-0112.html
https://www.suse.com/security/cve/CVE-2022-0113.html
https://www.suse.com/security/cve/CVE-2022-0114.html
https://www.suse.com/security/cve/CVE-2022-0115.html
https://www.suse.com/security/cve/CVE-2022-0116.html
https://www.suse.com/security/cve/CVE-2022-0117.html
https://www.suse.com/security/cve/CVE-2022-0118.html
https://www.suse.com/security/cve/CVE-2022-0120.html
https://www.suse.com/security/cve/CVE-2022-0289.html
https://www.suse.com/security/cve/CVE-2022-0290.html
https://www.suse.com/security/cve/CVE-2022-0291.html
https://www.suse.com/security/cve/CVE-2022-0292.html
https://www.suse.com/security/cve/CVE-2022-0293.html
https://www.suse.com/security/cve/CVE-2022-0294.html
https://www.suse.com/security/cve/CVE-2022-0295.html
https://www.suse.com/security/cve/CVE-2022-0296.html
https://www.suse.com/security/cve/CVE-2022-0297.html
https://www.suse.com/security/cve/CVE-2022-0298.html
https://www.suse.com/security/cve/CVE-2022-0300.html
https://www.suse.com/security/cve/CVE-2022-0301.html
https://www.suse.com/security/cve/CVE-2022-0302.html
https://www.suse.com/security/cve/CVE-2022-0304.html
https://www.suse.com/security/cve/CVE-2022-0305.html
https://www.suse.com/security/cve/CVE-2022-0306.html
https://www.suse.com/security/cve/CVE-2022-0307.html
https://www.suse.com/security/cve/CVE-2022-0308.html
https://www.suse.com/security/cve/CVE-2022-0309.html
https://www.suse.com/security/cve/CVE-2022-0310.html
https://www.suse.com/security/cve/CVE-2022-0311.html
https://www.suse.com/security/cve/CVE-2022-0452.html
https://www.suse.com/security/cve/CVE-2022-0453.html
https://www.suse.com/security/cve/CVE-2022-0454.html
https://www.suse.com/security/cve/CVE-2022-0455.html
https://www.suse.com/security/cve/CVE-2022-0456.html
https://www.suse.com/security/cve/CVE-2022-0457.html
https://www.suse.com/security/cve/CVE-2022-0458.html
https://www.suse.com/security/cve/CVE-2022-0459.html
https://www.suse.com/security/cve/CVE-2022-0460.html
https://www.suse.com/security/cve/CVE-2022-0461.html
https://www.suse.com/security/cve/CVE-2022-0462.html
https://www.suse.com/security/cve/CVE-2022-0463.html
https://www.suse.com/security/cve/CVE-2022-0464.html
https://www.suse.com/security/cve/CVE-2022-0465.html
https://www.suse.com/security/cve/CVE-2022-0466.html
https://www.suse.com/security/cve/CVE-2022-0467.html
https://www.suse.com/security/cve/CVE-2022-0468.html
https://www.suse.com/security/cve/CVE-2022-0469.html
https://www.suse.com/security/cve/CVE-2022-0470.html
https://www.suse.com/security/cve/CVE-2022-0603.html
https://www.suse.com/security/cve/CVE-2022-0604.html
https://www.suse.com/security/cve/CVE-2022-0605.html
https://www.suse.com/security/cve/CVE-2022-0606.html
https://www.suse.com/security/cve/CVE-2022-0607.html
https://www.suse.com/security/cve/CVE-2022-0608.html
https://www.suse.com/security/cve/CVE-2022-0609.html
https://www.suse.com/security/cve/CVE-2022-0610.html
https://www.suse.com/security/cve/CVE-2022-0789.html
https://www.suse.com/security/cve/CVE-2022-0790.html
https://www.suse.com/security/cve/CVE-2022-0791.html
https://www.suse.com/security/cve/CVE-2022-0792.html
https://www.suse.com/security/cve/CVE-2022-0793.html
https://www.suse.com/security/cve/CVE-2022-0794.html
https://www.suse.com/security/cve/CVE-2022-0795.html
https://www.suse.com/security/cve/CVE-2022-0796.html
https://www.suse.com/security/cve/CVE-2022-0797.html
https://www.suse.com/security/cve/CVE-2022-0798.html
https://www.suse.com/security/cve/CVE-2022-0799.html
https://www.suse.com/security/cve/CVE-2022-0800.html
https://www.suse.com/security/cve/CVE-2022-0801.html
https://www.suse.com/security/cve/CVE-2022-0802.html
https://www.suse.com/security/cve/CVE-2022-0803.html
https://www.suse.com/security/cve/CVE-2022-0804.html
https://www.suse.com/security/cve/CVE-2022-0805.html
https://www.suse.com/security/cve/CVE-2022-0806.html
https://www.suse.com/security/cve/CVE-2022-0807.html
https://www.suse.com/security/cve/CVE-2022-0808.html
https://www.suse.com/security/cve/CVE-2022-0809.html
https://www.suse.com/security/cve/CVE-2022-1096.html
1
0
openSUSE-RU-2022:1132-1: moderate: Recommended update for kdump
by maintenance@opensuse.org 08 Apr '22
by maintenance@opensuse.org 08 Apr '22
08 Apr '22
openSUSE Recommended Update: Recommended update for kdump
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:1132-1
Rating: moderate
References: #1189923 #1197069
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that has two recommended fixes can now be
installed.
Description:
This update for kdump fixes the following issues:
- Fix return code when no watchdog sysfs entry is found (bsc#1197069)
- Add watchdog modules to kdump initrd to ensure kernel crash dumps are
properly collected before a machine is rebooted by a watchdog
(bsc#1189923)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1132=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
kdump-0.9.0-150300.18.8.1
kdump-debuginfo-0.9.0-150300.18.8.1
kdump-debugsource-0.9.0-150300.18.8.1
References:
https://bugzilla.suse.com/1189923
https://bugzilla.suse.com/1197069
1
0
openSUSE-RU-2022:1138-1: moderate: Recommended update for gnome-shell
by maintenance@opensuse.org 08 Apr '22
by maintenance@opensuse.org 08 Apr '22
08 Apr '22
openSUSE Recommended Update: Recommended update for gnome-shell
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:1138-1
Rating: moderate
References: #1185944 #1187571 #1190745 #1196708
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that has four recommended fixes can now be
installed.
Description:
This update for gnome-shell fixes the following issues:
- Show message "Multiple logins are not supported" when mixed
locally/remotely login. (bsc#1190745)
- Fix grab issue when destroying open popup menu. (bsc#1187571)
- The previous code always restarted whole ECalClientView when it received
any changes in it, which could sometimes lead to constant repeated
restarts of the view. (bsc#1185944)
- Fix the failed login when remotely login. (bsc#1196708)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1138=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
gnome-shell-3.34.5-150300.10.5.1
gnome-shell-calendar-3.34.5-150300.10.5.1
gnome-shell-calendar-debuginfo-3.34.5-150300.10.5.1
gnome-shell-debuginfo-3.34.5-150300.10.5.1
gnome-shell-debugsource-3.34.5-150300.10.5.1
gnome-shell-devel-3.34.5-150300.10.5.1
- openSUSE Leap 15.3 (noarch):
gnome-shell-lang-3.34.5-150300.10.5.1
References:
https://bugzilla.suse.com/1185944
https://bugzilla.suse.com/1187571
https://bugzilla.suse.com/1190745
https://bugzilla.suse.com/1196708
1
0
openSUSE-OU-2022:1134-1: moderate: Optional update for SUSE Package Hub
by maintenance@opensuse.org 08 Apr '22
by maintenance@opensuse.org 08 Apr '22
08 Apr '22
openSUSE Optional Update: Optional update for SUSE Package Hub
______________________________________________________________________________
Announcement ID: openSUSE-OU-2022:1134-1
Rating: moderate
References: MSC-303
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has 0 optional fixes and contains one
feature can now be installed.
Description:
This optional update provides the following changes:
- Provide binaries for non x86_64 architectures directly to SUSE Package
Hub.
- There are no visible changes for the final user.
- Affected source packages: gfbgraph, librest, gnome-online-accounts, gcr
Patch Instructions:
To install this openSUSE Optional Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1134=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1134=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
librest-0_7-0-0.8.1-3.2.1
librest-0_7-0-debuginfo-0.8.1-3.2.1
librest-debugsource-0.8.1-3.2.1
librest-devel-0.8.1-3.2.1
typelib-1_0-Rest-0_7-0.8.1-3.2.1
- openSUSE Leap 15.4 (x86_64):
librest-0_7-0-32bit-0.8.1-3.2.1
librest-0_7-0-32bit-debuginfo-0.8.1-3.2.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
gcr-data-3.34.0-5.2.1
gcr-debugsource-3.34.0-5.2.1
gcr-prompter-3.34.0-5.2.1
gcr-prompter-debuginfo-3.34.0-5.2.1
gcr-ssh-askpass-3.34.0-5.2.1
gcr-ssh-askpass-debuginfo-3.34.0-5.2.1
gcr-viewer-3.34.0-5.2.1
gcr-viewer-debuginfo-3.34.0-5.2.1
gfbgraph-debugsource-0.2.3-3.2.1
gfbgraph-devel-0.2.3-3.2.1
gnome-online-accounts-3.34.1-3.2.1
gnome-online-accounts-debuginfo-3.34.1-3.2.1
gnome-online-accounts-debugsource-3.34.1-3.2.1
gnome-online-accounts-devel-3.34.1-3.2.1
libgck-1-0-3.34.0-5.2.1
libgck-1-0-debuginfo-3.34.0-5.2.1
libgck-devel-3.34.0-5.2.1
libgcr-3-1-3.34.0-5.2.1
libgcr-3-1-debuginfo-3.34.0-5.2.1
libgcr-devel-3.34.0-5.2.1
libgfbgraph-0_2-0-0.2.3-3.2.1
libgfbgraph-0_2-0-debuginfo-0.2.3-3.2.1
libgoa-1_0-0-3.34.1-3.2.1
libgoa-1_0-0-debuginfo-3.34.1-3.2.1
libgoa-backend-1_0-1-3.34.1-3.2.1
libgoa-backend-1_0-1-debuginfo-3.34.1-3.2.1
librest-0_7-0-0.8.1-3.2.1
librest-0_7-0-debuginfo-0.8.1-3.2.1
librest-debugsource-0.8.1-3.2.1
librest-devel-0.8.1-3.2.1
typelib-1_0-GFBGraph-0_2-0.2.3-3.2.1
typelib-1_0-Gck-1-3.34.0-5.2.1
typelib-1_0-Gcr-3-3.34.0-5.2.1
typelib-1_0-GcrUi-3-3.34.0-5.2.1
typelib-1_0-Goa-1_0-3.34.1-3.2.1
typelib-1_0-Rest-0_7-0.8.1-3.2.1
- openSUSE Leap 15.3 (x86_64):
libgck-1-0-32bit-3.34.0-5.2.1
libgck-1-0-32bit-debuginfo-3.34.0-5.2.1
libgck-devel-32bit-3.34.0-5.2.1
libgcr-3-1-32bit-3.34.0-5.2.1
libgcr-3-1-32bit-debuginfo-3.34.0-5.2.1
libgcr-devel-32bit-3.34.0-5.2.1
libgoa-1_0-0-32bit-3.34.1-3.2.1
libgoa-1_0-0-32bit-debuginfo-3.34.1-3.2.1
libgoa-backend-1_0-1-32bit-3.34.1-3.2.1
libgoa-backend-1_0-1-32bit-debuginfo-3.34.1-3.2.1
librest-0_7-0-32bit-0.8.1-3.2.1
librest-0_7-0-32bit-debuginfo-0.8.1-3.2.1
- openSUSE Leap 15.3 (noarch):
gcr-lang-3.34.0-5.2.1
gnome-online-accounts-lang-3.34.1-3.2.1
References:
1
0
openSUSE-SU-2022:0108-1: important: Security update for seamonkey
by opensuse-security@opensuse.org 08 Apr '22
by opensuse-security@opensuse.org 08 Apr '22
08 Apr '22
openSUSE Security Update: Security update for seamonkey
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0108-1
Rating: important
References: #1185055 #1188564 #1188565 #1191902 #1191904
#1191905 #1191909 #1191910 #1191911 #1191913
#1191914 #1192052 #1194198 #1194232 #1197518
Cross-References: CVE-2021-2163 CVE-2021-2341 CVE-2021-2369
CVE-2021-35556 CVE-2021-35559 CVE-2021-35560
CVE-2021-35564 CVE-2021-35565 CVE-2021-35578
CVE-2021-35586 CVE-2021-35588 CVE-2021-41035
CVSS scores:
CVE-2021-2163 (NVD) : 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-2163 (SUSE): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-2341 (NVD) : 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-2341 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-2369 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2021-2369 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2021-35556 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35556 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35559 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35560 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-35560 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-35564 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2021-35564 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2021-35565 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35565 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35578 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35578 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35586 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35586 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2021-35588 (NVD) : 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-35588 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-41035 (SUSE): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves 12 vulnerabilities and has three
fixes is now available.
Description:
SeaMonkey was updated to 2.53.11.1:
Update to SeaMonkey 2.53.11.1
* Fix edge case when setting IntersectionObserver threshold bug 1758291.
* OAuth2 prefs should use realuserName instead of username bug 1518126.
* SeaMonkey 2.53.11.1 uses the same backend as Firefox and contains the
relevant Firefox 60.8 security fixes.
* SeaMonkey 2.53.11.1 shares most parts of the mail and news code with
Thunderbird. Please read the Thunderbird 60.8.0 release notes for
specific security fixes in this release.
* Additional important security fixes up to Current Firefox 91.7 and
Thunderbird 91.7 ESR plus many enhancements have been backported. We
will continue to enhance SeaMonkey security in subsequent 2.53.x beta
and release versions as fast as we are able to.
* Remove obsolete MOZ_EXTENSIONS check in suite
* Add connect button to cZ Networks Editor
* Remove freenode remnants from ChatZilla in SeaMonkey
* Prefer secure over insecure protocol in network list in ChatZilla
* Composer - Change tag textbox is not removed after use
* Clean up repo links in debugQA
* Fix misspelled references to macOS in suite
* Remove obsolete references to Java and Flash
* Help button not working in delete cert dialog
* Rearrange Message Filter Dialog to make room for new features
* Use Insert key as shortcut to create new message filters
* Rename some variables used in SeaMonkey's FilterListDialog to match
Thunderbird's
* Implement Copy to New message filter functionality
* Add move to top / bottom buttons to message filters
* Add preference to not prompt for message filter deletion
* Clean up folder handling in FilterListDialog
* Add refresh function to Filter list dialog so that it can be updated
when already open and new filters are added externally
* Use listbox rather than tree in FilterListDialog
* MsgFilterList(args) should take targetFilter and pass it to
FilterListDialog
* Mail&News' start.xhtml: "We" link broken
* Add search functionality to filter dialog
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-2022-108=1 openSUSE-SLE-15.3-2022-108=1
Package List:
- openSUSE Leap 15.3 (ppc64le s390x x86_64):
java-1_8_0-ibm-1.8.0_sr7.0-3.53.1
java-1_8_0-ibm-demo-1.8.0_sr7.0-3.53.1
java-1_8_0-ibm-devel-1.8.0_sr7.0-3.53.1
java-1_8_0-ibm-src-1.8.0_sr7.0-3.53.1
- openSUSE Leap 15.3 (i586 x86_64):
seamonkey-2.53.11.1-lp153.17.5.1
seamonkey-debuginfo-2.53.11.1-lp153.17.5.1
seamonkey-debugsource-2.53.11.1-lp153.17.5.1
seamonkey-dom-inspector-2.53.11.1-lp153.17.5.1
seamonkey-irc-2.53.11.1-lp153.17.5.1
- openSUSE Leap 15.3 (x86_64):
java-1_8_0-ibm-32bit-1.8.0_sr7.0-3.53.1
java-1_8_0-ibm-alsa-1.8.0_sr7.0-3.53.1
java-1_8_0-ibm-devel-32bit-1.8.0_sr7.0-3.53.1
java-1_8_0-ibm-plugin-1.8.0_sr7.0-3.53.1
References:
https://www.suse.com/security/cve/CVE-2021-2163.html
https://www.suse.com/security/cve/CVE-2021-2341.html
https://www.suse.com/security/cve/CVE-2021-2369.html
https://www.suse.com/security/cve/CVE-2021-35556.html
https://www.suse.com/security/cve/CVE-2021-35559.html
https://www.suse.com/security/cve/CVE-2021-35560.html
https://www.suse.com/security/cve/CVE-2021-35564.html
https://www.suse.com/security/cve/CVE-2021-35565.html
https://www.suse.com/security/cve/CVE-2021-35578.html
https://www.suse.com/security/cve/CVE-2021-35586.html
https://www.suse.com/security/cve/CVE-2021-35588.html
https://www.suse.com/security/cve/CVE-2021-41035.html
https://bugzilla.suse.com/1185055
https://bugzilla.suse.com/1188564
https://bugzilla.suse.com/1188565
https://bugzilla.suse.com/1191902
https://bugzilla.suse.com/1191904
https://bugzilla.suse.com/1191905
https://bugzilla.suse.com/1191909
https://bugzilla.suse.com/1191910
https://bugzilla.suse.com/1191911
https://bugzilla.suse.com/1191913
https://bugzilla.suse.com/1191914
https://bugzilla.suse.com/1192052
https://bugzilla.suse.com/1194198
https://bugzilla.suse.com/1194232
https://bugzilla.suse.com/1197518
1
0
openSUSE-SU-2022:1127-1: important: Security update for MozillaFirefox
by opensuse-security@opensuse.org 07 Apr '22
by opensuse-security@opensuse.org 07 Apr '22
07 Apr '22
openSUSE Security Update: Security update for MozillaFirefox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:1127-1
Rating: important
References: #1197698 #1197903
Cross-References: CVE-2022-1097 CVE-2022-1196 CVE-2022-24713
CVE-2022-28281 CVE-2022-28282 CVE-2022-28285
CVE-2022-28286 CVE-2022-28289
CVSS scores:
CVE-2022-24713 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-24713 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes 8 vulnerabilities is now available.
Description:
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):
MFSA 2022-14 (bsc#1197903)
* CVE-2022-1097: Fixed memory safety violations that could occur when
PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN
Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the
border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR
91.8
The following non-security bugs were fixed:
- Adjust rust dependency for SP3 and later. TW uses always the newest
version of rust, but we don't, so we can't use the rust+cargo notation,
which would need both < and >= requirements. (bsc#1197698)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1127=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1127=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-91.8.0-150200.152.26.1
MozillaFirefox-branding-upstream-91.8.0-150200.152.26.1
MozillaFirefox-debuginfo-91.8.0-150200.152.26.1
MozillaFirefox-debugsource-91.8.0-150200.152.26.1
MozillaFirefox-devel-91.8.0-150200.152.26.1
MozillaFirefox-translations-common-91.8.0-150200.152.26.1
MozillaFirefox-translations-other-91.8.0-150200.152.26.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
MozillaFirefox-91.8.0-150200.152.26.1
MozillaFirefox-branding-upstream-91.8.0-150200.152.26.1
MozillaFirefox-debuginfo-91.8.0-150200.152.26.1
MozillaFirefox-debugsource-91.8.0-150200.152.26.1
MozillaFirefox-devel-91.8.0-150200.152.26.1
MozillaFirefox-translations-common-91.8.0-150200.152.26.1
MozillaFirefox-translations-other-91.8.0-150200.152.26.1
References:
https://www.suse.com/security/cve/CVE-2022-1097.html
https://www.suse.com/security/cve/CVE-2022-1196.html
https://www.suse.com/security/cve/CVE-2022-24713.html
https://www.suse.com/security/cve/CVE-2022-28281.html
https://www.suse.com/security/cve/CVE-2022-28282.html
https://www.suse.com/security/cve/CVE-2022-28285.html
https://www.suse.com/security/cve/CVE-2022-28286.html
https://www.suse.com/security/cve/CVE-2022-28289.html
https://bugzilla.suse.com/1197698
https://bugzilla.suse.com/1197903
1
0
openSUSE-RU-2022:1126-1: moderate: Recommended update for nfs-utils
by maintenance@opensuse.org 07 Apr '22
by maintenance@opensuse.org 07 Apr '22
07 Apr '22
openSUSE Recommended Update: Recommended update for nfs-utils
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:1126-1
Rating: moderate
References: #1197297 #1197788
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has two recommended fixes can now be
installed.
Description:
This update for nfs-utils fixes the following issues:
- Ensure `sloppy` is added correctly for newer kernels. (bsc#1197297)
* This is required for kernels since 5.6 (like in SUSE Linux Enterprise
15 SP4), and it's safe for all kernels.
- Fix the source build with new `glibc` like in SUSE Linux Enterprise 15
SP4. (bsc#1197788)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1126=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1126=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
nfs-client-2.1.1-150100.10.24.1
nfs-client-debuginfo-2.1.1-150100.10.24.1
nfs-doc-2.1.1-150100.10.24.1
nfs-kernel-server-2.1.1-150100.10.24.1
nfs-kernel-server-debuginfo-2.1.1-150100.10.24.1
nfs-utils-debuginfo-2.1.1-150100.10.24.1
nfs-utils-debugsource-2.1.1-150100.10.24.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
nfs-client-2.1.1-150100.10.24.1
nfs-client-debuginfo-2.1.1-150100.10.24.1
nfs-doc-2.1.1-150100.10.24.1
nfs-kernel-server-2.1.1-150100.10.24.1
nfs-kernel-server-debuginfo-2.1.1-150100.10.24.1
nfs-utils-debuginfo-2.1.1-150100.10.24.1
nfs-utils-debugsource-2.1.1-150100.10.24.1
References:
https://bugzilla.suse.com/1197297
https://bugzilla.suse.com/1197788
1
0
openSUSE-SU-2022:0105-1: important: Security update for pdns-recursor
by opensuse-security@opensuse.org 07 Apr '22
by opensuse-security@opensuse.org 07 Apr '22
07 Apr '22
openSUSE Security Update: Security update for pdns-recursor
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0105-1
Rating: important
References: #1197525
Cross-References: CVE-2022-27227
CVSS scores:
CVE-2022-27227 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27227 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for pdns-recursor fixes the following issues:
- CVE-2022-27227: Fixed incomplete validation of incoming IXFR transfers.
It applies to setups retrieving one or more RPZ zones from a remote
server if the network path to the server is not trusted. (boo#1197525)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-105=1
Package List:
- openSUSE Backports SLE-15-SP3 (aarch64 ppc64le s390x x86_64):
pdns-recursor-4.3.5-bp153.2.3.1
References:
https://www.suse.com/security/cve/CVE-2022-27227.html
https://bugzilla.suse.com/1197525
1
0
openSUSE-SU-2022:0104-1: important: Security update for SDL2
by opensuse-security@opensuse.org 07 Apr '22
by opensuse-security@opensuse.org 07 Apr '22
07 Apr '22
openSUSE Security Update: Security update for SDL2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0104-1
Rating: important
References: #1181201 #1181202 #1197525
Cross-References: CVE-2020-14409 CVE-2020-14410 CVE-2022-27227
CVSS scores:
CVE-2020-14409 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2020-14409 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2020-14410 (NVD) : 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
CVE-2020-14410 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-27227 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27227 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP3
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for SDL2 fixes the following issues:
- CVE-2020-14409: Fixed Integer Overflow resulting in heap corruption in
SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP (bsc#1181202).
- CVE-2020-14410: Fixed heap-based buffer over-read in
Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP
(bsc#1181201).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-104=1
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-104=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
SDL2-debugsource-2.0.8-11.3.1
libSDL2-2_0-0-2.0.8-11.3.1
libSDL2-2_0-0-debuginfo-2.0.8-11.3.1
libSDL2-devel-2.0.8-11.3.1
- openSUSE Leap 15.3 (x86_64):
libSDL2-2_0-0-32bit-2.0.8-11.3.1
libSDL2-2_0-0-32bit-debuginfo-2.0.8-11.3.1
libSDL2-devel-32bit-2.0.8-11.3.1
- openSUSE Backports SLE-15-SP3 (aarch64 ppc64le s390x x86_64):
pdns-4.3.1-bp153.2.3.1
pdns-backend-geoip-4.3.1-bp153.2.3.1
pdns-backend-godbc-4.3.1-bp153.2.3.1
pdns-backend-ldap-4.3.1-bp153.2.3.1
pdns-backend-lua-4.3.1-bp153.2.3.1
pdns-backend-mysql-4.3.1-bp153.2.3.1
pdns-backend-postgresql-4.3.1-bp153.2.3.1
pdns-backend-remote-4.3.1-bp153.2.3.1
pdns-backend-sqlite3-4.3.1-bp153.2.3.1
References:
https://www.suse.com/security/cve/CVE-2020-14409.html
https://www.suse.com/security/cve/CVE-2020-14410.html
https://www.suse.com/security/cve/CVE-2022-27227.html
https://bugzilla.suse.com/1181201
https://bugzilla.suse.com/1181202
https://bugzilla.suse.com/1197525
1
0
openSUSE-RU-2022:1124-1: Recommended update for compat-libpthread-nonshared
by maintenance@opensuse.org 06 Apr '22
by maintenance@opensuse.org 06 Apr '22
06 Apr '22
openSUSE Recommended Update: Recommended update for compat-libpthread-nonshared
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:1124-1
Rating: low
References: #1197272
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for compat-libpthread-nonshared fixes the following issues:
- Also build s390x version (bsc#1197272)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1124=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1124=1
Package List:
- openSUSE Leap 15.4 (x86_64):
compat-libpthread-nonshared-0-150300.3.6.1
compat-libpthread-nonshared-32bit-0-150300.3.6.1
- openSUSE Leap 15.3 (x86_64):
compat-libpthread-nonshared-0-150300.3.6.1
compat-libpthread-nonshared-32bit-0-150300.3.6.1
References:
https://bugzilla.suse.com/1197272
1
0
openSUSE-RU-2022:1119-1: moderate: Recommended update for supportutils
by maintenance@opensuse.org 06 Apr '22
by maintenance@opensuse.org 06 Apr '22
06 Apr '22
openSUSE Recommended Update: Recommended update for supportutils
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:1119-1
Rating: moderate
References: #1189028 #1190315 #1190943 #1191096 #1191794
#1193204 #1193732 #1193868 #1195797
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has 9 recommended fixes can now be installed.
Description:
This update for supportutils fixes the following issues:
- Add command `blkid`
- Add email.txt based on OPTION_EMAIL (bsc#1189028)
- Add rpcinfo -p output #116
- Add s390x specific files and output
- Add shared memory as a log directory for emergency use (bsc#1190943)
- Fix cron package for RPM validation (bsc#1190315)
- Fix for invalid argument during updates (bsc#1193204)
- Fix iscsi initiator name (bsc#1195797)
- Improve `lsblk` readability with `--ascsi` option
- Include 'multipath -t' output in mpio.txt
- Include /etc/sssd/conf.d configuration files
- Include udev rules in /lib/udev/rules.d/
- Made /proc directory and network names spaces configurable (bsc#1193868)
- Prepare future installation of binaries to /usr/sbin instead of /sbin.
This does not affect SUSE Linux Enterprise 15 Serivce Pack 3 and 4
(bsc#1191096)
- Move localmessage/warm logs out of messages.txt to new localwarn.txt
- Optimize configuration files
- Remove chronyc DNS lookups with -n switch (bsc#1193732)
- Remove duplicate commands in network.txt
- Remove duplicate firewalld status output
- getappcore identifies compressed core files (bsc#1191794)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1119=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1119=1
Package List:
- openSUSE Leap 15.4 (noarch):
supportutils-3.1.20-150300.7.35.10.1
- openSUSE Leap 15.3 (noarch):
supportutils-3.1.20-150300.7.35.10.1
References:
https://bugzilla.suse.com/1189028
https://bugzilla.suse.com/1190315
https://bugzilla.suse.com/1190943
https://bugzilla.suse.com/1191096
https://bugzilla.suse.com/1191794
https://bugzilla.suse.com/1193204
https://bugzilla.suse.com/1193732
https://bugzilla.suse.com/1193868
https://bugzilla.suse.com/1195797
1
0
openSUSE-OU-2022:1116-1: moderate: Optional update for SUSE Package Hub
by maintenance@opensuse.org 06 Apr '22
by maintenance@opensuse.org 06 Apr '22
06 Apr '22
openSUSE Optional Update: Optional update for SUSE Package Hub
______________________________________________________________________________
Announcement ID: openSUSE-OU-2022:1116-1
Rating: moderate
References: MSC-303
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has 0 optional fixes and contains one
feature can now be installed.
Description:
This optional update provides the following changes:
- Provide binaries for non x86_64 architectures directly to SUSE Package
Hub.
- There are no visible changes for the final user.
- Affected source packages: libexttextcat
Patch Instructions:
To install this openSUSE Optional Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1116=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1116=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libexttextcat-2_0-0-3.4.5-3.2.1
libexttextcat-2_0-0-debuginfo-3.4.5-3.2.1
libexttextcat-3.4.5-3.2.1
libexttextcat-debuginfo-3.4.5-3.2.1
libexttextcat-debugsource-3.4.5-3.2.1
libexttextcat-devel-3.4.5-3.2.1
libexttextcat-tools-3.4.5-3.2.1
libexttextcat-tools-debuginfo-3.4.5-3.2.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libexttextcat-2_0-0-3.4.5-3.2.1
libexttextcat-2_0-0-debuginfo-3.4.5-3.2.1
libexttextcat-3.4.5-3.2.1
libexttextcat-debuginfo-3.4.5-3.2.1
libexttextcat-debugsource-3.4.5-3.2.1
libexttextcat-devel-3.4.5-3.2.1
libexttextcat-tools-3.4.5-3.2.1
libexttextcat-tools-debuginfo-3.4.5-3.2.1
References:
1
0
openSUSE-RU-2022:1118-1: moderate: Recommended update for timezone
by maintenance@opensuse.org 06 Apr '22
by maintenance@opensuse.org 06 Apr '22
06 Apr '22
openSUSE Recommended Update: Recommended update for timezone
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:1118-1
Rating: moderate
References: #1177460
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for timezone fixes the following issues:
- timezone update 2022a (bsc#1177460):
* Palestine will spring forward on 2022-03-27, not on 03-26
* `zdump -v` now outputs better failure indications
* Bug fixes for code that reads corrupted TZif data
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1118=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1118=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
timezone-2022a-150000.75.7.1
timezone-debuginfo-2022a-150000.75.7.1
timezone-debugsource-2022a-150000.75.7.1
- openSUSE Leap 15.4 (noarch):
timezone-java-2022a-150000.75.7.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
timezone-2022a-150000.75.7.1
timezone-debuginfo-2022a-150000.75.7.1
timezone-debugsource-2022a-150000.75.7.1
- openSUSE Leap 15.3 (noarch):
timezone-java-2022a-150000.75.7.1
References:
https://bugzilla.suse.com/1177460
1
0
openSUSE-FU-2022:1115-1: moderate: Feature update for alsa-oss
by maintenance@opensuse.org 06 Apr '22
by maintenance@opensuse.org 06 Apr '22
06 Apr '22
openSUSE Feature Update: Feature update for alsa-oss
______________________________________________________________________________
Announcement ID: openSUSE-FU-2022:1115-1
Rating: moderate
References: #1181571 MSC-303
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one feature fix and contains one feature
can now be installed.
Description:
This feature update for alsa-oss provides the following changes:
Update from version 1.0.28 to version 1.1.8 (bsc#1181571)
- Drop the superfluous build requires `alsa-topology-devel`. It is no
longer mandatory.
- Avoid repetition of name in package summary and updated description.
- Fix build issues with the recent `glibc` (bsc#1181571)
- Update the Free Software Foundation, Inc. address
- Provide binaries for non x86_64 architectures directly to SUSE Package
Hub.
Patch Instructions:
To install this openSUSE Feature Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1115=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1115=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
alsa-oss-1.1.8-150300.12.3.2
alsa-oss-debuginfo-1.1.8-150300.12.3.2
alsa-oss-debugsource-1.1.8-150300.12.3.2
- openSUSE Leap 15.4 (x86_64):
alsa-oss-32bit-1.1.8-150300.12.3.2
alsa-oss-32bit-debuginfo-1.1.8-150300.12.3.2
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
alsa-oss-1.1.8-150300.12.3.2
alsa-oss-debuginfo-1.1.8-150300.12.3.2
alsa-oss-debugsource-1.1.8-150300.12.3.2
- openSUSE Leap 15.3 (x86_64):
alsa-oss-32bit-1.1.8-150300.12.3.2
alsa-oss-32bit-debuginfo-1.1.8-150300.12.3.2
References:
https://bugzilla.suse.com/1181571
1
0
openSUSE-RU-2022:1107-1: moderate: Recommended update for util-linux
by maintenance@opensuse.org 04 Apr '22
by maintenance@opensuse.org 04 Apr '22
04 Apr '22
openSUSE Recommended Update: Recommended update for util-linux
______________________________________________________________________________
Announcement ID: openSUSE-RU-2022:1107-1
Rating: moderate
References: #1194642
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for util-linux fixes the following issue:
- Improve throughput and reduce clock sequence increments for high load
situation with time based version 1 uuids. (bsc#1194642)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1107=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libblkid-devel-2.36.2-150300.4.20.1
libblkid-devel-static-2.36.2-150300.4.20.1
libblkid1-2.36.2-150300.4.20.1
libblkid1-debuginfo-2.36.2-150300.4.20.1
libfdisk-devel-2.36.2-150300.4.20.1
libfdisk-devel-static-2.36.2-150300.4.20.1
libfdisk1-2.36.2-150300.4.20.1
libfdisk1-debuginfo-2.36.2-150300.4.20.1
libmount-devel-2.36.2-150300.4.20.1
libmount-devel-static-2.36.2-150300.4.20.1
libmount1-2.36.2-150300.4.20.1
libmount1-debuginfo-2.36.2-150300.4.20.1
libsmartcols-devel-2.36.2-150300.4.20.1
libsmartcols-devel-static-2.36.2-150300.4.20.1
libsmartcols1-2.36.2-150300.4.20.1
libsmartcols1-debuginfo-2.36.2-150300.4.20.1
libuuid-devel-2.36.2-150300.4.20.1
libuuid-devel-static-2.36.2-150300.4.20.1
libuuid1-2.36.2-150300.4.20.1
libuuid1-debuginfo-2.36.2-150300.4.20.1
python3-libmount-2.36.2-150300.4.20.1
python3-libmount-debuginfo-2.36.2-150300.4.20.1
python3-libmount-debugsource-2.36.2-150300.4.20.1
util-linux-2.36.2-150300.4.20.1
util-linux-debuginfo-2.36.2-150300.4.20.1
util-linux-debugsource-2.36.2-150300.4.20.1
util-linux-systemd-2.36.2-150300.4.20.1
util-linux-systemd-debuginfo-2.36.2-150300.4.20.1
util-linux-systemd-debugsource-2.36.2-150300.4.20.1
uuidd-2.36.2-150300.4.20.1
uuidd-debuginfo-2.36.2-150300.4.20.1
- openSUSE Leap 15.3 (x86_64):
libblkid-devel-32bit-2.36.2-150300.4.20.1
libblkid1-32bit-2.36.2-150300.4.20.1
libblkid1-32bit-debuginfo-2.36.2-150300.4.20.1
libfdisk-devel-32bit-2.36.2-150300.4.20.1
libfdisk1-32bit-2.36.2-150300.4.20.1
libfdisk1-32bit-debuginfo-2.36.2-150300.4.20.1
libmount-devel-32bit-2.36.2-150300.4.20.1
libmount1-32bit-2.36.2-150300.4.20.1
libmount1-32bit-debuginfo-2.36.2-150300.4.20.1
libsmartcols-devel-32bit-2.36.2-150300.4.20.1
libsmartcols1-32bit-2.36.2-150300.4.20.1
libsmartcols1-32bit-debuginfo-2.36.2-150300.4.20.1
libuuid-devel-32bit-2.36.2-150300.4.20.1
libuuid1-32bit-2.36.2-150300.4.20.1
libuuid1-32bit-debuginfo-2.36.2-150300.4.20.1
- openSUSE Leap 15.3 (noarch):
util-linux-lang-2.36.2-150300.4.20.1
References:
https://bugzilla.suse.com/1194642
1
0
openSUSE-SU-2022:0103-1: important: Security update for opera
by opensuse-security@opensuse.org 04 Apr '22
by opensuse-security@opensuse.org 04 Apr '22
04 Apr '22
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:0103-1
Rating: important
References:
Cross-References: CVE-2022-0789 CVE-2022-0790 CVE-2022-0791
CVE-2022-0792 CVE-2022-0793 CVE-2022-0794
CVE-2022-0795 CVE-2022-0796 CVE-2022-0797
CVE-2022-0798 CVE-2022-0799 CVE-2022-0800
CVE-2022-0801 CVE-2022-0802 CVE-2022-0803
CVE-2022-0804 CVE-2022-0805 CVE-2022-0806
CVE-2022-0807 CVE-2022-0808 CVE-2022-0809
CVE-2022-1096
Affected Products:
openSUSE Leap 15.3:NonFree
______________________________________________________________________________
An update that fixes 22 vulnerabilities is now available.
Description:
This update for opera fixes the following issues:
Opera was updated to 85.0.4341.28
- CHR-8816 Update chromium on desktop-stable-99-4341 to 99.0.4844.84
- DNA-98092 Crash at views::MenuItemView::GetMenuController()
- DNA-98278 Translations for O85
- DNA-98320 [Mac] Unable to delete recent search entries
- DNA-98614 Show recent searches for non-BABE users
- DNA-98615 Allow removal of recent searches
- DNA-98616 Add recent searches to ���old��� BABE
- DNA-98617 Make it possible to disable ad-blocker per-country
- DNA-98651 Remove Instagram and Facebook Messenger in Russia
- DNA-98653 Add flag #recent-searches
- DNA-98696 smoketest
PageInfoHistoryDataSourceTest.FormatTimestampString failing
- DNA-98703 Port Chromium issue 1309225 to Opera Stable
- The update to chromium 99.0.4844.84 fixes following issues: CVE-2022-1096
- Changes in 85.0.4341.18
- CHR-8789 Update chromium on desktop-stable-99-4341 to 99.0.4844.51
- DNA-98059 [Linux] Crash at
opera::FreedomSettingsImpl::IsBypassForDotlessDomainsEnabled
- DNA-98349 [Linux] Crash at bluez::BluezDBusManager::Get()
- DNA-98126 System crash dialog shown on macOS <= 10.15
- DNA-98331 [Snap] Meme generator cropping / resizing broken
- DNA-98394 Audio tab indicator set to "muted" on videoconferencing sites
- DNA-98481 Report errors in opauto_collector
- The update to chromium 99.0.4844.51 fixes following issues:
CVE-2022-0789, CVE-2022-0790, CVE-2022-0791, CVE-2022-0792,
CVE-2022-0793, CVE-2022-0794, CVE-2022-0795, CVE-2022-0796,
CVE-2022-0797, CVE-2022-0798, CVE-2022-0799, CVE-2022-0800,
CVE-2022-0801, CVE-2022-0802, CVE-2022-0803, CVE-2022-0804,
CVE-2022-0805, CVE-2022-0806, CVE-2022-0807, CVE-2022-0808, CVE-2022-0809
- Changes in 85.0.4341.13
- DNA-94119 Upgrade curl to 7.81.0
- DNA-97849 [Mac monterey] System shortcut interfere with Opera���s
`ToggleSearchInOpenTabs` shortcut
- DNA-98204 Automatic popout happens when video is paused
- DNA-98231 Shortcuts are blocked by displayed tab tooltip when
triggered quickly after tooltip appears
- DNA-98321 Add thinlto-cache warnings to suppression list
- DNA-98395 Promote O85 to stable
- Complete Opera 85.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-85/
- Update to 84.0.4316.42
- DNA-94119 Upgrade curl to 7.81.0
- DNA-98092 Crash at views::MenuItemView::GetMenuController()
- DNA-98204 Automatic popout happens when video is paused
- DNA-98231 Shortcuts are blocked by displayed tab tooltip when
triggered quickly after tooltip appears
- Update to 84.0.4316.31
- CHR-8772 Update chromium on desktop-stable-98-4316 to 98.0.4758.109
- DNA-97573 [Win][Lin]���Close tab��� button is not displayed on tabs
playing media when many tabs are open
- DNA-97729 cancelling the process uploading custom Wallpaper crashes
the browser
- DNA-97871 Google meet tab���s icons don���t fit on pinned tab
- DNA-97872 Tab is being unpinned when video conferencing button is
clicked
- DNA-98039 Dark theme top sites have black background
- DNA-98117 Clicking current tab information should hide tooltip
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:NonFree:
zypper in -t patch openSUSE-2022-103=1
Package List:
- openSUSE Leap 15.3:NonFree (x86_64):
opera-85.0.4341.28-lp153.2.42.1
References:
https://www.suse.com/security/cve/CVE-2022-0789.html
https://www.suse.com/security/cve/CVE-2022-0790.html
https://www.suse.com/security/cve/CVE-2022-0791.html
https://www.suse.com/security/cve/CVE-2022-0792.html
https://www.suse.com/security/cve/CVE-2022-0793.html
https://www.suse.com/security/cve/CVE-2022-0794.html
https://www.suse.com/security/cve/CVE-2022-0795.html
https://www.suse.com/security/cve/CVE-2022-0796.html
https://www.suse.com/security/cve/CVE-2022-0797.html
https://www.suse.com/security/cve/CVE-2022-0798.html
https://www.suse.com/security/cve/CVE-2022-0799.html
https://www.suse.com/security/cve/CVE-2022-0800.html
https://www.suse.com/security/cve/CVE-2022-0801.html
https://www.suse.com/security/cve/CVE-2022-0802.html
https://www.suse.com/security/cve/CVE-2022-0803.html
https://www.suse.com/security/cve/CVE-2022-0804.html
https://www.suse.com/security/cve/CVE-2022-0805.html
https://www.suse.com/security/cve/CVE-2022-0806.html
https://www.suse.com/security/cve/CVE-2022-0807.html
https://www.suse.com/security/cve/CVE-2022-0808.html
https://www.suse.com/security/cve/CVE-2022-0809.html
https://www.suse.com/security/cve/CVE-2022-1096.html
1
0