openSUSE Security Update: Security update for opera
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2023:0115-1
Rating:             important
References:         
Cross-References:   CVE-2022-3196 CVE-2022-3197 CVE-2022-3198
                    CVE-2022-3199 CVE-2022-3200 CVE-2022-3201
                    CVE-2022-3445 CVE-2022-3446 CVE-2022-3447
                    CVE-2022-3448 CVE-2022-3449 CVE-2022-3450
                    CVE-2022-3723 CVE-2022-3885 CVE-2022-3886
                    CVE-2022-3887 CVE-2022-3888 CVE-2022-3889
                    CVE-2022-4262 CVE-2022-4436 CVE-2022-4437
                    CVE-2022-4438 CVE-2022-4439 CVE-2022-4440
                    CVE-2023-0471 CVE-2023-0472 CVE-2023-0473
                    CVE-2023-0474 CVE-2023-0696 CVE-2023-0697
                    CVE-2023-0698 CVE-2023-0699 CVE-2023-0700
                    CVE-2023-0701 CVE-2023-0702 CVE-2023-0703
                    CVE-2023-0704 CVE-2023-0705 CVE-2023-0927
                    CVE-2023-0928 CVE-2023-0929 CVE-2023-0930
                    CVE-2023-0931 CVE-2023-0932 CVE-2023-0933
                    CVE-2023-0941 CVE-2023-1213 CVE-2023-1214
                    CVE-2023-1215 CVE-2023-1216 CVE-2023-1217
                    CVE-2023-1218 CVE-2023-1219 CVE-2023-1220
                    CVE-2023-1221 CVE-2023-1222 CVE-2023-1223
                    CVE-2023-1224 CVE-2023-1225 CVE-2023-1226
                    CVE-2023-1227 CVE-2023-1228 CVE-2023-1229
                    CVE-2023-1230 CVE-2023-1231 CVE-2023-1232
                    CVE-2023-1233 CVE-2023-1234 CVE-2023-1235
                    CVE-2023-1236 CVE-2023-1528 CVE-2023-1529
                    CVE-2023-1530 CVE-2023-1531 CVE-2023-1532
                    CVE-2023-1533 CVE-2023-1534 CVE-2023-2033
                    CVE-2023-2133 CVE-2023-2134 CVE-2023-2135
                    CVE-2023-2136 CVE-2023-2137 CVE-2023-2721
                    CVE-2023-2722 CVE-2023-2723 CVE-2023-2724
                    CVE-2023-2725 CVE-2023-2726
CVSS scores:
                    CVE-2022-3196 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3197 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3198 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3199 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3200 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3201 (NVD) : 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
                    CVE-2022-3445 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3446 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3447 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2022-3448 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3449 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3450 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3723 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3885 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3886 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3887 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3888 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-3889 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-4262 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-4436 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-4437 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-4438 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-4439 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-4440 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0471 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0472 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0473 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0474 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0696 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0697 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2023-0698 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0699 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0700 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2023-0701 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0702 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0703 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0704 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2023-0705 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0927 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0928 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0929 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0930 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0931 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0932 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0933 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-0941 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1213 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1214 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1215 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1216 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1217 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2023-1218 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1219 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1220 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1221 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2023-1222 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1223 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2023-1224 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2023-1225 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2023-1226 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
                    CVE-2023-1227 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1228 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2023-1229 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2023-1230 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2023-1231 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2023-1232 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2023-1233 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2023-1234 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2023-1235 (NVD) : 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2023-1236 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
                    CVE-2023-1528 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1529 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2023-1530 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1531 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1532 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1533 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-1534 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2033 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2133 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2134 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2135 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2136 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
                    CVE-2023-2137 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2721 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2722 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2723 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2724 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2725 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2023-2726 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:
                    openSUSE Leap 15.5:NonFree
______________________________________________________________________________

   An update that fixes 89 vulnerabilities is now available.

Description:

   This update for opera fixes the following issues:

   - Update to 99.0.4788.13
     * CHR-9290 Update Chromium on desktop-stable-113-4788 to 113.0.5672.127
     * DNA-107317 __delayLoadHelper2 crash in crashreporter
   - The update to chromium 113.0.5672.127 fixes following issues:
     CVE-2023-2721, CVE-2023-2722, CVE-2023-2723, CVE-2023-2724,
     CVE-2023-2725, CVE-2023-2726

   - Update to 99.0.4788.9
     * CHR-9283 Update Chromium on desktop-stable-113-4788 to 113.0.5672.93
     * DNA-107638 Translations for O99
     * DNA-107678 Crash Report [@ BrowserContextKeyedServiceFactory::
       BrowserContextKeyedServiceFactory(char const*,
       BrowserContextDependencyManager*) ]
     * DNA-107795 Fix wrong german translation of 'Close All Duplicate Tabs'
     * DNA-107800 Fonts on section#folder and AddSitePanel not readable when
       animated wallpaper chosen
     * DNA-107840 Promote O99 to stable

   - Update to 98.0.4759.39
     * DNA-102363 ChromeFileSystemAccessPermissionContextTest.
       ConfirmSensitiveEntryAccess_DangerousFile fails
     * DNA-105534 [Add to Opera] Incorrect scroll on modal when browser
       window size is too small
     * DNA-106649 Opening new tab when pinned tab is active gives 2 active
       tabs
     * DNA-107226 Speed Dial freezes and empty space remains after Continue
       booking tile dragging
     * DNA-107435 Building archive_source_release target fails
     * DNA-107441 [Start page] Right mouse click on tile in continue
       on section opens target site in current tab
     * DNA-107508 Crash at permissions::PermissionRecoverySuccessRate
       Tracker::TrackUsage(ContentSettingsType)
     * DNA-107528 Handle real-time SD impression reporting
     * DNA-107546 Context menus broken with one workspace
     * DNA-107548 Paste from Context Menu doesn’t work for Search
       on StartPage
     * DNA-107560 Optimize real-time SD impression reporting


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.5:NonFree:

      zypper in -t patch openSUSE-2023-115=1



Package List:

   - openSUSE Leap 15.5:NonFree (x86_64):

      opera-99.0.4788.13-lp155.3.6.1


References:

   https://www.suse.com/security/cve/CVE-2022-3196.html
   https://www.suse.com/security/cve/CVE-2022-3197.html
   https://www.suse.com/security/cve/CVE-2022-3198.html
   https://www.suse.com/security/cve/CVE-2022-3199.html
   https://www.suse.com/security/cve/CVE-2022-3200.html
   https://www.suse.com/security/cve/CVE-2022-3201.html
   https://www.suse.com/security/cve/CVE-2022-3445.html
   https://www.suse.com/security/cve/CVE-2022-3446.html
   https://www.suse.com/security/cve/CVE-2022-3447.html
   https://www.suse.com/security/cve/CVE-2022-3448.html
   https://www.suse.com/security/cve/CVE-2022-3449.html
   https://www.suse.com/security/cve/CVE-2022-3450.html
   https://www.suse.com/security/cve/CVE-2022-3723.html
   https://www.suse.com/security/cve/CVE-2022-3885.html
   https://www.suse.com/security/cve/CVE-2022-3886.html
   https://www.suse.com/security/cve/CVE-2022-3887.html
   https://www.suse.com/security/cve/CVE-2022-3888.html
   https://www.suse.com/security/cve/CVE-2022-3889.html
   https://www.suse.com/security/cve/CVE-2022-4262.html
   https://www.suse.com/security/cve/CVE-2022-4436.html
   https://www.suse.com/security/cve/CVE-2022-4437.html
   https://www.suse.com/security/cve/CVE-2022-4438.html
   https://www.suse.com/security/cve/CVE-2022-4439.html
   https://www.suse.com/security/cve/CVE-2022-4440.html
   https://www.suse.com/security/cve/CVE-2023-0471.html
   https://www.suse.com/security/cve/CVE-2023-0472.html
   https://www.suse.com/security/cve/CVE-2023-0473.html
   https://www.suse.com/security/cve/CVE-2023-0474.html
   https://www.suse.com/security/cve/CVE-2023-0696.html
   https://www.suse.com/security/cve/CVE-2023-0697.html
   https://www.suse.com/security/cve/CVE-2023-0698.html
   https://www.suse.com/security/cve/CVE-2023-0699.html
   https://www.suse.com/security/cve/CVE-2023-0700.html
   https://www.suse.com/security/cve/CVE-2023-0701.html
   https://www.suse.com/security/cve/CVE-2023-0702.html
   https://www.suse.com/security/cve/CVE-2023-0703.html
   https://www.suse.com/security/cve/CVE-2023-0704.html
   https://www.suse.com/security/cve/CVE-2023-0705.html
   https://www.suse.com/security/cve/CVE-2023-0927.html
   https://www.suse.com/security/cve/CVE-2023-0928.html
   https://www.suse.com/security/cve/CVE-2023-0929.html
   https://www.suse.com/security/cve/CVE-2023-0930.html
   https://www.suse.com/security/cve/CVE-2023-0931.html
   https://www.suse.com/security/cve/CVE-2023-0932.html
   https://www.suse.com/security/cve/CVE-2023-0933.html
   https://www.suse.com/security/cve/CVE-2023-0941.html
   https://www.suse.com/security/cve/CVE-2023-1213.html
   https://www.suse.com/security/cve/CVE-2023-1214.html
   https://www.suse.com/security/cve/CVE-2023-1215.html
   https://www.suse.com/security/cve/CVE-2023-1216.html
   https://www.suse.com/security/cve/CVE-2023-1217.html
   https://www.suse.com/security/cve/CVE-2023-1218.html
   https://www.suse.com/security/cve/CVE-2023-1219.html
   https://www.suse.com/security/cve/CVE-2023-1220.html
   https://www.suse.com/security/cve/CVE-2023-1221.html
   https://www.suse.com/security/cve/CVE-2023-1222.html
   https://www.suse.com/security/cve/CVE-2023-1223.html
   https://www.suse.com/security/cve/CVE-2023-1224.html
   https://www.suse.com/security/cve/CVE-2023-1225.html
   https://www.suse.com/security/cve/CVE-2023-1226.html
   https://www.suse.com/security/cve/CVE-2023-1227.html
   https://www.suse.com/security/cve/CVE-2023-1228.html
   https://www.suse.com/security/cve/CVE-2023-1229.html
   https://www.suse.com/security/cve/CVE-2023-1230.html
   https://www.suse.com/security/cve/CVE-2023-1231.html
   https://www.suse.com/security/cve/CVE-2023-1232.html
   https://www.suse.com/security/cve/CVE-2023-1233.html
   https://www.suse.com/security/cve/CVE-2023-1234.html
   https://www.suse.com/security/cve/CVE-2023-1235.html
   https://www.suse.com/security/cve/CVE-2023-1236.html
   https://www.suse.com/security/cve/CVE-2023-1528.html
   https://www.suse.com/security/cve/CVE-2023-1529.html
   https://www.suse.com/security/cve/CVE-2023-1530.html
   https://www.suse.com/security/cve/CVE-2023-1531.html
   https://www.suse.com/security/cve/CVE-2023-1532.html
   https://www.suse.com/security/cve/CVE-2023-1533.html
   https://www.suse.com/security/cve/CVE-2023-1534.html
   https://www.suse.com/security/cve/CVE-2023-2033.html
   https://www.suse.com/security/cve/CVE-2023-2133.html
   https://www.suse.com/security/cve/CVE-2023-2134.html
   https://www.suse.com/security/cve/CVE-2023-2135.html
   https://www.suse.com/security/cve/CVE-2023-2136.html
   https://www.suse.com/security/cve/CVE-2023-2137.html
   https://www.suse.com/security/cve/CVE-2023-2721.html
   https://www.suse.com/security/cve/CVE-2023-2722.html
   https://www.suse.com/security/cve/CVE-2023-2723.html
   https://www.suse.com/security/cve/CVE-2023-2724.html
   https://www.suse.com/security/cve/CVE-2023-2725.html
   https://www.suse.com/security/cve/CVE-2023-2726.html

openSUSE: 2023:0115-1 important: opera

June 16, 2023
An update that fixes 89 vulnerabilities is now available

Description

This update for opera fixes the following issues: - Update to 99.0.4788.13 * CHR-9290 Update Chromium on desktop-stable-113-4788 to 113.0.5672.127 * DNA-107317 __delayLoadHelper2 crash in crashreporter - The update to chromium 113.0.5672.127 fixes following issues: CVE-2023-2721, CVE-2023-2722, CVE-2023-2723, CVE-2023-2724, CVE-2023-2725, CVE-2023-2726 - Update to 99.0.4788.9 * CHR-9283 Update Chromium on desktop-stable-113-4788 to 113.0.5672.93 * DNA-107638 Translations for O99 * DNA-107678 Crash Report [@ BrowserContextKeyedServiceFactory:: BrowserContextKeyedServiceFactory(char const*, BrowserContextDependencyManager*) ] * DNA-107795 Fix wrong german translation of 'Close All Duplicate Tabs' * DNA-107800 Fonts on section#folder and AddSitePanel not readable when animated wallpaper chosen * DNA-107840 Promote O99 to stable - Update to 98.0.4759.39 * DNA-102363 ChromeFileSystemAccessPermissionContextTest. ConfirmSensitiveEntryAccess_DangerousFile fails * DNA-105534 [Add to Opera] Incorrect scroll on modal when browser window size is too small * DNA-106649 Opening new tab when pinned tab is active gives 2 active tabs * DNA-107226 Speed Dial freezes and empty space remains after Continue booking tile dragging * DNA-107435 Building archive_source_release target fails * DNA-107441 [Start page] Right mouse click on tile in continue on section opens target site in current tab * DNA-107508 Crash at permissions::PermissionRecoverySuccessRate Tracker::TrackUsage(ContentSettingsType) * DNA-107528 Handle real-time SD impression reporting * DNA-107546 Context menus broken with one workspace * DNA-107548 Paste from Context Menu doesn’t work for Search on StartPage * DNA-107560 Optimize real-time SD impression reporting

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.5:NonFree: zypper in -t patch openSUSE-2023-115=1


Package List

- openSUSE Leap 15.5:NonFree (x86_64): opera-99.0.4788.13-lp155.3.6.1


References

https://www.suse.com/security/cve/CVE-2022-3196.html https://www.suse.com/security/cve/CVE-2022-3197.html https://www.suse.com/security/cve/CVE-2022-3198.html https://www.suse.com/security/cve/CVE-2022-3199.html https://www.suse.com/security/cve/CVE-2022-3200.html https://www.suse.com/security/cve/CVE-2022-3201.html https://www.suse.com/security/cve/CVE-2022-3445.html https://www.suse.com/security/cve/CVE-2022-3446.html https://www.suse.com/security/cve/CVE-2022-3447.html https://www.suse.com/security/cve/CVE-2022-3448.html https://www.suse.com/security/cve/CVE-2022-3449.html https://www.suse.com/security/cve/CVE-2022-3450.html https://www.suse.com/security/cve/CVE-2022-3723.html https://www.suse.com/security/cve/CVE-2022-3885.html https://www.suse.com/security/cve/CVE-2022-3886.html https://www.suse.com/security/cve/CVE-2022-3887.html https://www.suse.com/security/cve/CVE-2022-3888.html https://www.suse.com/security/cve/CVE-2022-3889.html https://www.suse.com/security/cve/CVE-2022-4262.html https://www.suse.com/security/cve/CVE-2022-4436.html https://www.suse.com/security/cve/CVE-2022-4437.html https://www.suse.com/security/cve/CVE-2022-4438.html https://www.suse.com/security/cve/CVE-2022-4439.html https://www.suse.com/security/cve/CVE-2022-4440.html https://www.suse.com/security/cve/CVE-2023-0471.html https://www.suse.com/security/cve/CVE-2023-0472.html https://www.suse.com/security/cve/CVE-2023-0473.html https://www.suse.com/security/cve/CVE-2023-0474.html https://www.suse.com/security/cve/CVE-2023-0696.html https://www.suse.com/security/cve/CVE-2023-0697.html https://www.suse.com/security/cve/CVE-2023-0698.html https://www.suse.com/security/cve/CVE-2023-0699.html https://www.suse.com/security/cve/CVE-2023-0700.html https://www.suse.com/security/cve/CVE-2023-0701.html https://www.suse.com/security/cve/CVE-2023-0702.html https://www.suse.com/security/cve/CVE-2023-0703.html https://www.suse.com/security/cve/CVE-2023-0704.html https://www.suse.com/security/cve/CVE-2023-0705.html https://www.suse.com/security/cve/CVE-2023-0927.html https://www.suse.com/security/cve/CVE-2023-0928.html https://www.suse.com/security/cve/CVE-2023-0929.html https://www.suse.com/security/cve/CVE-2023-0930.html https://www.suse.com/security/cve/CVE-2023-0931.html https://www.suse.com/security/cve/CVE-2023-0932.html https://www.suse.com/security/cve/CVE-2023-0933.html https://www.suse.com/security/cve/CVE-2023-0941.html https://www.suse.com/security/cve/CVE-2023-1213.html https://www.suse.com/security/cve/CVE-2023-1214.html https://www.suse.com/security/cve/CVE-2023-1215.html https://www.suse.com/security/cve/CVE-2023-1216.html https://www.suse.com/security/cve/CVE-2023-1217.html https://www.suse.com/security/cve/CVE-2023-1218.html https://www.suse.com/security/cve/CVE-2023-1219.html https://www.suse.com/security/cve/CVE-2023-1220.html https://www.suse.com/security/cve/CVE-2023-1221.html https://www.suse.com/security/cve/CVE-2023-1222.html https://www.suse.com/security/cve/CVE-2023-1223.html https://www.suse.com/security/cve/CVE-2023-1224.html https://www.suse.com/security/cve/CVE-2023-1225.html https://www.suse.com/security/cve/CVE-2023-1226.html https://www.suse.com/security/cve/CVE-2023-1227.html https://www.suse.com/security/cve/CVE-2023-1228.html https://www.suse.com/security/cve/CVE-2023-1229.html https://www.suse.com/security/cve/CVE-2023-1230.html https://www.suse.com/security/cve/CVE-2023-1231.html https://www.suse.com/security/cve/CVE-2023-1232.html https://www.suse.com/security/cve/CVE-2023-1233.html https://www.suse.com/security/cve/CVE-2023-1234.html https://www.suse.com/security/cve/CVE-2023-1235.html https://www.suse.com/security/cve/CVE-2023-1236.html https://www.suse.com/security/cve/CVE-2023-1528.html https://www.suse.com/security/cve/CVE-2023-1529.html https://www.suse.com/security/cve/CVE-2023-1530.html https://www.suse.com/security/cve/CVE-2023-1531.html https://www.suse.com/security/cve/CVE-2023-1532.html https://www.suse.com/security/cve/CVE-2023-1533.html https://www.suse.com/security/cve/CVE-2023-1534.html https://www.suse.com/security/cve/CVE-2023-2033.html https://www.suse.com/security/cve/CVE-2023-2133.html https://www.suse.com/security/cve/CVE-2023-2134.html https://www.suse.com/security/cve/CVE-2023-2135.html https://www.suse.com/security/cve/CVE-2023-2136.html https://www.suse.com/security/cve/CVE-2023-2137.html https://www.suse.com/security/cve/CVE-2023-2721.html https://www.suse.com/security/cve/CVE-2023-2722.html https://www.suse.com/security/cve/CVE-2023-2723.html https://www.suse.com/security/cve/CVE-2023-2724.html https://www.suse.com/security/cve/CVE-2023-2725.html https://www.suse.com/security/cve/CVE-2023-2726.html


Severity
Announcement ID: openSUSE-SU-2023:0115-1
Rating: important
Affected Products: openSUSE Leap 15.5:NonFree .

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo