<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for liferea</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2023:0096-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-04-27T12:51:25Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-04-27T12:51:25Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-04-27T12:51:25Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for liferea</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
liferea was updated to version 1.14.1:

+ Fix CVE-2023-1350 - Remote code execution on feed enrichment (boo#1209190).

Update to version 1.14.0:

+ New 'Reader mode' preference that allows stripping all web
  content
+ Implement support for Webkits Intelligent Tracking Protection
+ New progress bar when loading websites
+ Youtube videos from media:video can be embedded now with a
  click on the video preview picture.
+ Changes to UserAgent handling: same UA is now used for both
  feed fetching and internal browsing.
+ New view mode 'Automatic' which switches between 'Normal' and
  'Wide' mode based on the window proportions.
+ Liferea now supports the new GTK dark theme logic, where in
  the GTK/GNOME preferences you define wether you 'prefer' dark
  mode or light mode
+ Favicon discovery improvements: now detects all types of Apple
  Touch Icons, MS Tile Images and Safari Mask Icons
+ Increase size of stored favicons to 128x128px to improve icon
  quality in 3-pane wide view.
+ Make several plugins support gettext
+ Allow mutiple feed in same libnotify notification
+ Redesign of the update message in the status bar. It now shows
  a update counter of the feeds being in update.
+ You can now export a feed to XML file
+ Added an option to show news bins in reduced feed list
+ Added menu option to send item per mail
+ Default to https:// instead of http:// when user doesn't
  provide protocol on subscribing feed
+ Implement support for subscribing to LD+Json metadata listings
  e.g. concert or theater event listings
+ Implement support for subscribing to HTML5 websites
+ Support for media:description field of Youtube feeds
+ Improve HTML5 extraction: extract main tag if it exists and
  no article was found.
+ Execute feed pipe/filter commands asynchronously
+ Better explanation of feed update errors.
+ Added generic Google Reader API support (allows using FeedHQ,
  FreshRSS, Miniflux...)
+ Now allow converting TinyTinyRSS subscriptions to
  local subscriptions
+ New search folder rule to match podcasts
+ New search folder rule to match headline authors
+ New search folder rule to match subscription source
+ New search folder rule to match parent folder name
+ New search folder property that allows hiding read items
+ Now search folders are automatically rebuild when rules are
  changed
+ Added new plugin 'add-bookmark-site' that allows to configure
  a custom bookmarking site.
+ Added new plugin 'getfocus' that adds transparency on the feed
  list when it is not focussed.
+ Trayicon plugin has now a configuration option to change the
  behaviour when closing Liferea.
+ Trayicon plugin has now an option to disable minimizing to tray
+ New hot key Ctrl-D for 'Open in External Browser'
+ New hot key F10 for headerbar plugin to allow triggering the
  hamburger menu
+ New hot key Ctrl-0 to reset zoom
+ New hot key Ctrl-O to open enclosures
+ Fix hidden panes, Liferea will never allow the panes to be
  smaller than 5% in height or width
+ Wait for network to be fully available before updating
+ 2-pane mode was removed
+ Dropped CDF channel support
+ Dropped Atom 0.2/0.3 (aka Pie) support
+ Dropped blogChannel namespace support
+ Dropped photo namespace support

- Require python3-cairo; needed for tray icon (boo#1193579).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2023-96</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U2XWO532L7BXCMKLBA5M4DP7HIU4NSO2/</URL>
      <Description>E-Mail link for openSUSE-SU-2023:0096-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193579</URL>
      <Description>SUSE Bug 1193579</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209190</URL>
      <Description>SUSE Bug 1209190</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-1350/</URL>
      <Description>SUSE CVE CVE-2023-1350 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP4">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP4">
        <FullProductName ProductID="SUSE Package Hub 15 SP4">SUSE Package Hub 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="liferea-1.14.1-bp154.2.3.1">
      <FullProductName ProductID="liferea-1.14.1-bp154.2.3.1">liferea-1.14.1-bp154.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="liferea-lang-1.14.1-bp154.2.3.1">
      <FullProductName ProductID="liferea-lang-1.14.1-bp154.2.3.1">liferea-lang-1.14.1-bp154.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="liferea-1.14.1-bp154.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP4">
      <FullProductName ProductID="SUSE Package Hub 15 SP4:liferea-1.14.1-bp154.2.3.1">liferea-1.14.1-bp154.2.3.1 as a component of SUSE Package Hub 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="liferea-lang-1.14.1-bp154.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP4">
      <FullProductName ProductID="SUSE Package Hub 15 SP4:liferea-lang-1.14.1-bp154.2.3.1">liferea-lang-1.14.1-bp154.2.3.1 as a component of SUSE Package Hub 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="liferea-1.14.1-bp154.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:liferea-1.14.1-bp154.2.3.1">liferea-1.14.1-bp154.2.3.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="liferea-lang-1.14.1-bp154.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:liferea-lang-1.14.1-bp154.2.3.1">liferea-lang-1.14.1-bp154.2.3.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in liferea. It has been rated as critical. Affected by this issue is the function update_job_run of the file src/update.c of the component Feed Enrichment. The manipulation of the argument source with the input |date &amp;gt;/tmp/bad-item-link.txt leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222848.</Note>
    </Notes>
    <CVE>CVE-2023-1350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:liferea-1.14.1-bp154.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:liferea-lang-1.14.1-bp154.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:liferea-1.14.1-bp154.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:liferea-lang-1.14.1-bp154.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U2XWO532L7BXCMKLBA5M4DP7HIU4NSO2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-1350.html</URL>
        <Description>CVE-2023-1350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209190</URL>
        <Description>SUSE Bug 1209190</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
