![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.833228 |
Category: | SuSE Local Security Checks |
Title: | openSUSE: Security Advisory for opera (openSUSE-SU-2022:10057-1) |
Summary: | The remote host is missing an update for the 'opera'; package(s) announced via the openSUSE-SU-2022:10057-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'opera' package(s) announced via the openSUSE-SU-2022:10057-1 advisory. Vulnerability Insight: This update for opera fixes the following issues: opera was updated to 88.0.4412.74: - DNA-100645 Cherry-pick CVE-2022-2294 onto stabilization branches Update to 88.0.4412.53 - DNA-99108 [Lin] Options on video pop out not possible to change - DNA-99832 On automatic video popout, close button should not stop video - DNA-99833 Allow turning on and off of each 'BABE' section from gear icon - DNA-99852 Default browser in Mac installer - DNA-99993 Crashes in AudioFileReaderTest, FFmpegAACBitstreamConverterTest - DNA-100045 iFrame Exception not unblocked with Acceptable Ads - DNA-100291 Update snapcraft uploading/releasing in scripts to use craft store Changes in 88.0.4412.40 - CHR-8905 Update chromium on desktop-stable-102-4412 to 102.0.5005.115 - DNA-99713 Sizing issues with video conferencing controls in PiP window - DNA-99831 Add 'back to tab' button like on video pop-out - The update to chromium 102.0.5005.115 fixes following issues: CVE-2022-2007, CVE-2022-2008, CVE-2022-2010, CVE-2022-2011 Changes in 88.0.4412.27 - DNA-99725 Crash at opera::ModalDialogViews::Show() - DNA-99752 Do not allow to uncheck all lists for adBlock - DNA-99918 Enable #scrollable-tab-strip on desktop-stable-102-4412 - DNA-99969 Promote O88 to stable - Complete Opera 88.0 changelog at: - DNA-99478 Top Sites dont always has big icon - DNA-99702 Enable Acceptable Ads for stable stream - DNA-99725 Crash at opera::ModalDialogViews::Show() - DNA-99752 Do not allow to uncheck all lists for adBlock - Update to 87.0.4390.36 - CHR-8883 Update chromium on desktop-stable-101-4390 to 101.0.4951.67 - DNA-99190 Investigate windows installer signature errors on win7 - DNA-99502 Sidebar API to open panels - DNA-99593 Report sad tab displayed counts per kind - DNA-99628 Personalized Speed Dial context menu issue fix Affected Software/OS: 'opera' package(s) on openSUSE Leap 15.4:NonFree. Solution: Please install the updated package(s). CVSS Score: 9.4 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-2007 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ https://security.gentoo.org/glsa/202208-25 https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop.html https://crbug.com/1326210 Common Vulnerability Exposure (CVE) ID: CVE-2022-2008 https://crbug.com/1317673 Common Vulnerability Exposure (CVE) ID: CVE-2022-2010 https://crbug.com/1325298 Common Vulnerability Exposure (CVE) ID: CVE-2022-2011 https://crbug.com/1330379 Common Vulnerability Exposure (CVE) ID: CVE-2022-2294 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7/ https://security.gentoo.org/glsa/202208-35 https://security.gentoo.org/glsa/202208-39 https://security.gentoo.org/glsa/202311-11 https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop.html https://crbug.com/1341043 http://www.openwall.com/lists/oss-security/2022/07/28/2 |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |