SUSE 5172 Published by

An opera security update has been released for openSUSE Leap 15.3.



openSUSE-SU-2022:0047-1: important: Security update for opera


openSUSE Security Update: Security update for opera
______________________________________________________________________________

Announcement ID: openSUSE-SU-2022:0047-1
Rating: important
References:
Cross-References: CVE-2021-37980 CVE-2021-37997 CVE-2021-37998
CVE-2021-37999 CVE-2021-38001 CVE-2021-38002
CVE-2021-38003 CVE-2021-38004 CVE-2021-38005
CVE-2021-38006 CVE-2021-38007 CVE-2021-38008
CVE-2021-38009 CVE-2021-38010 CVE-2021-38011
CVE-2021-38012 CVE-2021-38013 CVE-2021-38014
CVE-2021-38015 CVE-2021-38016 CVE-2021-38017
CVE-2021-38019 CVE-2021-38020 CVE-2021-38021
CVE-2021-38022 CVE-2021-4052 CVE-2021-4053
CVE-2021-4054 CVE-2021-4055 CVE-2021-4056
CVE-2021-4057 CVE-2021-4058 CVE-2021-4059
CVE-2021-4061 CVE-2021-4062 CVE-2021-4063
CVE-2021-4064 CVE-2021-4065 CVE-2021-4066
CVE-2021-4067 CVE-2021-4068 CVE-2021-4078
CVE-2021-4079 CVE-2021-4098 CVE-2021-4099
CVE-2021-4100 CVE-2021-4101 CVE-2021-4102
CVE-2022-0096 CVE-2022-0097 CVE-2022-0098
CVE-2022-0099 CVE-2022-0100 CVE-2022-0101
CVE-2022-0102 CVE-2022-0103 CVE-2022-0104
CVE-2022-0105 CVE-2022-0106 CVE-2022-0107
CVE-2022-0108 CVE-2022-0109 CVE-2022-0110
CVE-2022-0111 CVE-2022-0112 CVE-2022-0113
CVE-2022-0114 CVE-2022-0115 CVE-2022-0116
CVE-2022-0117 CVE-2022-0118 CVE-2022-0120
CVE-2022-0289 CVE-2022-0290 CVE-2022-0291
CVE-2022-0292 CVE-2022-0293 CVE-2022-0294
CVE-2022-0295 CVE-2022-0296 CVE-2022-0297
CVE-2022-0298 CVE-2022-0300 CVE-2022-0301
CVE-2022-0302 CVE-2022-0304 CVE-2022-0305
CVE-2022-0306 CVE-2022-0307 CVE-2022-0308
CVE-2022-0309 CVE-2022-0310 CVE-2022-0311

CVSS scores:
CVE-2021-37980 (NVD) : 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
CVE-2021-37997 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37998 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-37999 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVE-2021-38001 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38002 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2021-38003 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38004 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-38005 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38006 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38007 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38008 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38009 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-38010 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-38011 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38012 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38013 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2021-38014 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38015 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38016 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38017 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-38019 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-38020 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2021-38021 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-38022 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-4052 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4053 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4054 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2021-4055 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4056 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4057 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4058 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4059 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-4061 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4062 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4063 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4064 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4065 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4066 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4067 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4068 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-4078 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4079 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4098 (NVD) : 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
CVE-2021-4099 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4100 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4101 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4102 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0096 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0097 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2022-0098 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0099 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0100 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0101 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0102 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0103 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0104 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0105 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0106 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0107 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0108 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0109 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0110 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2022-0111 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
CVE-2022-0289 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0290 (NVD) : 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CVE-2022-0293 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0295 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0296 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0297 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0298 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0300 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0302 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0304 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0307 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0308 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:
openSUSE Leap 15.3:NonFree
______________________________________________________________________________

An update that fixes 93 vulnerabilities is now available.

Description:

This update for opera fixes the following issues:

Update to 83.0.4254.27

- CHR-8737 Update chromium on desktop-stable-97-4254 to 97.0.4692.99
- DNA-96336 [Mac] Translate new network installer slogan
- DNA-96678 Add battery level monitoring capability to powerSavePrivate
- DNA-96939 Crash at
opera::ExternalVideoService::MarkAsManuallyClosed()
- DNA-97276 Enable #static-tab-audio-indicator on all streams

- The update to chromium 97.0.4692.99 fixes following issues:
CVE-2022-0289, CVE-2022-0290, CVE-2022-0291, CVE-2022-0292,
CVE-2022-0293, CVE-2022-0294, CVE-2022-0295, CVE-2022-0296,
CVE-2022-0297, CVE-2022-0298, CVE-2022-0300, CVE-2022-0301,
CVE-2022-0302, CVE-2022-0304, CVE-2022-0305, CVE-2022-0306,
CVE-2022-0307, CVE-2022-0308, CVE-2022-0309, CVE-2022-0310, CVE-2022-0311

Update to 83.0.4254.19

- DNA-96079 Turn on #automatic-video-popout on developer
- DNA-97070 Opera 83 translations
- DNA-97119 [LastCard] Stop showing used burner cards
- DNA-97131 Enable automatic-video-popout on all streams from O84 on
- DNA-97257 Crash at views::ImageButton::SetMinimumImageSize(gfx::Size
const&)
- DNA-97259 Promote O83 to stable

- Complete Opera 83.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-83/

- Update to 83.0.4254.16

- DNA-96968 Fix alignment of the 'Advanced' button in Settings

- Update to 83.0.4254.14

- CHR-8701 Update chromium on desktop-stable-97-4254 to 97.0.4692.45
- CHR-8713 Update chromium on desktop-stable-97-4254 to 97.0.4692.56
- CHR-8723 Update chromium on desktop-stable-97-4254 to 97.0.4692.71
- DNA-96780 Crash at
ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)
- DNA-96822 Tab close resize behavior change
- DNA-96861 Create Loomi Options menu
- DNA-96904 Support Win11 snap layout popup
- DNA-96951 Tab close animation broken
- DNA-96991 Tab X button doesn???t work correctly
- DNA-97027 Incorrect tab size after tab close
- The update to chromium 97.0.4692.71 fixes following issues:
CVE-2022-0096, CVE-2022-0097, CVE-2022-0098, CVE-2022-0099,
CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103,
CVE-2022-0104, CVE-2022-0105, CVE-2022-0105, CVE-2022-0106,
CVE-2022-0107, CVE-2022-0108, CVE-2022-0109, CVE-2022-0110,
CVE-2022-0111, CVE-2022-0111, CVE-2022-0112, CVE-2022-0113,
CVE-2022-0114, CVE-2022-0115, CVE-2022-0116, CVE-2022-0117,
CVE-2022-0118, CVE-2022-0120

- Update to version 82.0.4227.58

- DNA-96780 Crash at
ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)
- DNA-96890 Settings default browser not working for current user on
Windows 7

- Update to version 82.0.4227.43

- CHR-8705 Update chromium on desktop-stable-96-4227 to 96.0.4664.110
- DNA-93284 Unstable
obj/opera/desktop/common/installer_rc_generated/installer.res
- DNA-95908 Interstitial/internal pages shown as NOT SECURE after
visiting http site
- DNA-96404 Opera doesn???t show on main screen when second screen is
abruptly disconnected

- The update to chromium 96.0.4664.110 fixes following issues:
CVE-2021-4098, CVE-2021-4099, CVE-2021-4100, CVE-2021-4101, CVE-2021-4102

- Update to version 82.0.4227.33

- CHR-8689 Update chromium on desktop-stable-96-4227 to 96.0.4664.93
- DNA-96559 Tooltip popup looks bad in dark theme
- DNA-96570 [Player] Tidal logging in via PLAY doesn???t work
- DNA-96594 Unnecessary extra space in fullscreen mode on M1 Pro MacBooks
- DNA-96649 Update Meme button
- DNA-96676 Add Icon in the Sidebar Setup
- DNA-96677 Add default URL
- The update to chromium 96.0.4664.93 fixes following issues:
CVE-2021-4052, CVE-2021-4053, CVE-2021-4079, CVE-2021-4054,
CVE-2021-4078, CVE-2021-4055, CVE-2021-4056, CVE-2021-4057,
CVE-2021-4058, CVE-2021-4059, CVE-2021-4061, CVE-2021-4062,
CVE-2021-4063, CVE-2021-4064, CVE-2021-4065, CVE-2021-4066,
CVE-2021-4067, CVE-2021-4068

- Update to version 82.0.4227.23

- DNA-95632 With new au-logic UUID is set with delay and may be not set
for pb-builds (when closing fast)
- DNA-96349 Laggy tooltip animation
- DNA-96483 [Snap][Linux] Video not working / wrong ffmpeg snap version
for Opera 82
- DNA-96493 Create 'small' enticement in credit card autofill
- DNA-96533 Opera 82 translations
- DNA-96535 Make the URL configurable
- DNA-96553 Add switch to whitelist test pages
- DNA-96557 Links not opened from panel
- DNA-96558 AdBlock bloks some trackers inside the panel
- DNA-96568 [Player] Tidal in sidebar Player opens wrong site when
logging in
- DNA-96659 Siteprefs not applied after network service crash
- DNA-96593 Promote O82 to stable

- Complete Opera 82.0 changelog at:
  https://blogs.opera.com/desktop/changelog-for-82/

- Update to version 82.0.4227.13

- CHR-8668 Update chromium on desktop-stable-96-4227 to 96.0.4664.45
- DNA-76987 [Mac] Update desktop EULA with geolocation split
- DNA-93388 Problem with symlinks on windows when creating file list
- DNA-95734 Discarded Recently Closed items get revived after restart
- DNA-96134 "Your profile has been updated" does not disappear
- DNA-96190 Opera freezes when trying to drag expanded bookmark folder
with nested subfolders
- DNA-96223 Easy Files not working in Full Screen
- DNA-96274 Checkout autofill shouldn't show used burner card
- DNA-96275 Change the notification message for pausing multi-use cards
- DNA-96295 "Video pop out" setting doesn't sync
- DNA-96316 Highlight text wrong colour on dark mode
- DNA-96326 Wrong translation Private Mode > Turkish
- DNA-96351 macOS window controls are missing in full screen
- DNA-96440 Update video URL
- DNA-96448 add option to pin extension via rich hints
- DNA-96453 Register user-chosen option on client-side, read on hint side
- DNA-96454 Choosing an option from the settings menu should close the
popup
- DNA-96484 Enable AB test for a new autoupdater logic (for 50%)
- DNA-96500 Add "don't show me again" prefs to allowed whitelist
- DNA-96538 Inline audiocomplete for www.mediaexpert.pl incorrectly
suggested
- The update to chromium 96.0.4664.45 fixes following issues:
CVE-2021-38005, CVE-2021-38006, CVE-2021-38007, CVE-2021-38008,
CVE-2021-38009, CVE-2021-38010, CVE-2021-38011, CVE-2021-38012,
CVE-2021-38013, CVE-2021-38014, CVE-2021-38015, CVE-2021-38016,
CVE-2021-38017, CVE-2021-38019, CVE-2021-38020, CVE-2021-38021,
CVE-2021-38022

- Update to version 81.0.4196.54

- CHR-8644 Update chromium on desktop-stable-95-4196 to 95.0.4638.69
- DNA-95773 ExtensionWebRequestApiTest crashes on mac
- DNA-96062 Opera 81 translations
- DNA-96134 ???Your profile has been updated??? does not disappear
- DNA-96274 Checkout autofill shouldn???t show used burner card
- DNA-96275 Change the notification message for pausing multi-use cards
- DNA-96440 Update video URL

- The update to chromium 95.0.4638.69 fixes following issues:
CVE-2021-37997, CVE-2021-37998, CVE-2021-37999, CVE-2021-37980,
CVE-2021-38001, CVE-2021-38002, CVE-2021-38003, CVE-2021-38004

- Update to version 81.0.4196.37

- DNA-96008 Crash at
content::WebContentsImpl::OpenURL(content::OpenURLParams const&)
- DNA-96032 Closing the videoconference pop-up force leaving the meeting
- DNA-96092 Crash at void
opera::ModalDialogViews::OnWidgetClosing(opera::ModalDialog::Result)
- DNA-96142 [Yat] Emoji icon cut off in URL for Yat

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.3:NonFree:

zypper in -t patch openSUSE-2022-47=1


Package List:

- openSUSE Leap 15.3:NonFree (x86_64):

opera-83.0.4254.27-lp153.2.33.1

References:

  https://www.suse.com/security/cve/CVE-2021-37980.html
  https://www.suse.com/security/cve/CVE-2021-37997.html
  https://www.suse.com/security/cve/CVE-2021-37998.html
  https://www.suse.com/security/cve/CVE-2021-37999.html
  https://www.suse.com/security/cve/CVE-2021-38001.html
  https://www.suse.com/security/cve/CVE-2021-38002.html
  https://www.suse.com/security/cve/CVE-2021-38003.html
  https://www.suse.com/security/cve/CVE-2021-38004.html
  https://www.suse.com/security/cve/CVE-2021-38005.html
  https://www.suse.com/security/cve/CVE-2021-38006.html
  https://www.suse.com/security/cve/CVE-2021-38007.html
  https://www.suse.com/security/cve/CVE-2021-38008.html
  https://www.suse.com/security/cve/CVE-2021-38009.html
  https://www.suse.com/security/cve/CVE-2021-38010.html
  https://www.suse.com/security/cve/CVE-2021-38011.html
  https://www.suse.com/security/cve/CVE-2021-38012.html
  https://www.suse.com/security/cve/CVE-2021-38013.html
  https://www.suse.com/security/cve/CVE-2021-38014.html
  https://www.suse.com/security/cve/CVE-2021-38015.html
  https://www.suse.com/security/cve/CVE-2021-38016.html
  https://www.suse.com/security/cve/CVE-2021-38017.html
  https://www.suse.com/security/cve/CVE-2021-38019.html
  https://www.suse.com/security/cve/CVE-2021-38020.html
  https://www.suse.com/security/cve/CVE-2021-38021.html
  https://www.suse.com/security/cve/CVE-2021-38022.html
  https://www.suse.com/security/cve/CVE-2021-4052.html
  https://www.suse.com/security/cve/CVE-2021-4053.html
  https://www.suse.com/security/cve/CVE-2021-4054.html
  https://www.suse.com/security/cve/CVE-2021-4055.html
  https://www.suse.com/security/cve/CVE-2021-4056.html
  https://www.suse.com/security/cve/CVE-2021-4057.html
  https://www.suse.com/security/cve/CVE-2021-4058.html
  https://www.suse.com/security/cve/CVE-2021-4059.html
  https://www.suse.com/security/cve/CVE-2021-4061.html
  https://www.suse.com/security/cve/CVE-2021-4062.html
  https://www.suse.com/security/cve/CVE-2021-4063.html
  https://www.suse.com/security/cve/CVE-2021-4064.html
  https://www.suse.com/security/cve/CVE-2021-4065.html
  https://www.suse.com/security/cve/CVE-2021-4066.html
  https://www.suse.com/security/cve/CVE-2021-4067.html
  https://www.suse.com/security/cve/CVE-2021-4068.html
  https://www.suse.com/security/cve/CVE-2021-4078.html
  https://www.suse.com/security/cve/CVE-2021-4079.html
  https://www.suse.com/security/cve/CVE-2021-4098.html
  https://www.suse.com/security/cve/CVE-2021-4099.html
  https://www.suse.com/security/cve/CVE-2021-4100.html
  https://www.suse.com/security/cve/CVE-2021-4101.html
  https://www.suse.com/security/cve/CVE-2021-4102.html
  https://www.suse.com/security/cve/CVE-2022-0096.html
  https://www.suse.com/security/cve/CVE-2022-0097.html
  https://www.suse.com/security/cve/CVE-2022-0098.html
  https://www.suse.com/security/cve/CVE-2022-0099.html
  https://www.suse.com/security/cve/CVE-2022-0100.html
  https://www.suse.com/security/cve/CVE-2022-0101.html
  https://www.suse.com/security/cve/CVE-2022-0102.html
  https://www.suse.com/security/cve/CVE-2022-0103.html
  https://www.suse.com/security/cve/CVE-2022-0104.html
  https://www.suse.com/security/cve/CVE-2022-0105.html
  https://www.suse.com/security/cve/CVE-2022-0106.html
  https://www.suse.com/security/cve/CVE-2022-0107.html
  https://www.suse.com/security/cve/CVE-2022-0108.html
  https://www.suse.com/security/cve/CVE-2022-0109.html
  https://www.suse.com/security/cve/CVE-2022-0110.html
  https://www.suse.com/security/cve/CVE-2022-0111.html
  https://www.suse.com/security/cve/CVE-2022-0112.html
  https://www.suse.com/security/cve/CVE-2022-0113.html
  https://www.suse.com/security/cve/CVE-2022-0114.html
  https://www.suse.com/security/cve/CVE-2022-0115.html
  https://www.suse.com/security/cve/CVE-2022-0116.html
  https://www.suse.com/security/cve/CVE-2022-0117.html
  https://www.suse.com/security/cve/CVE-2022-0118.html
  https://www.suse.com/security/cve/CVE-2022-0120.html
  https://www.suse.com/security/cve/CVE-2022-0289.html
  https://www.suse.com/security/cve/CVE-2022-0290.html
  https://www.suse.com/security/cve/CVE-2022-0291.html
  https://www.suse.com/security/cve/CVE-2022-0292.html
  https://www.suse.com/security/cve/CVE-2022-0293.html
  https://www.suse.com/security/cve/CVE-2022-0294.html
  https://www.suse.com/security/cve/CVE-2022-0295.html
  https://www.suse.com/security/cve/CVE-2022-0296.html
  https://www.suse.com/security/cve/CVE-2022-0297.html
  https://www.suse.com/security/cve/CVE-2022-0298.html
  https://www.suse.com/security/cve/CVE-2022-0300.html
  https://www.suse.com/security/cve/CVE-2022-0301.html
  https://www.suse.com/security/cve/CVE-2022-0302.html
  https://www.suse.com/security/cve/CVE-2022-0304.html
  https://www.suse.com/security/cve/CVE-2022-0305.html
  https://www.suse.com/security/cve/CVE-2022-0306.html
  https://www.suse.com/security/cve/CVE-2022-0307.html
  https://www.suse.com/security/cve/CVE-2022-0308.html
  https://www.suse.com/security/cve/CVE-2022-0309.html
  https://www.suse.com/security/cve/CVE-2022-0310.html
  https://www.suse.com/security/cve/CVE-2022-0311.html