![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.833374 |
Category: | SuSE Local Security Checks |
Title: | openSUSE: Security Advisory for opera (openSUSE-SU-2022:10131-1) |
Summary: | The remote host is missing an update for the 'opera'; package(s) announced via the openSUSE-SU-2022:10131-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'opera' package(s) announced via the openSUSE-SU-2022:10131-1 advisory. Vulnerability Insight: This update for opera fixes the following issues: Update to 91.0.4516.20 - CHR-9019 Update chromium on desktop-stable-105-4516 to 105.0.5195.127 - DNA-101312 Allow changing logged in user with BrowserAPI - The update to chromium 105.0.5195.127 fixes following issues: CVE-2022-3196, CVE-2022-3197, CVE-2022-3198, CVE-2022-3199, CVE-2022-3200, CVE-2022-3201 Update to 91.0.4516.16 - CHR-9010 Update chromium on desktop-stable-105-4516 to 105.0.5195.102 - DNA-101447 Incorrect translation in Russian - DNA-101482 Crash at ProfileKey::GetProtoDatabaseProvider() - DNA-101495 Performance Stint 2022 - DNA-101551 Add version number info to browser API - DNA-101662 Suppress 'Allowing special test code paths' warning on buildbot - DNA-101753 News don't show after close browser - DNA-101760 Translations for O91 - DNA-101799 Crash at opera::SuggestionList::SortAndCull - DNA-101812 Sponsored site gets chosen as default entry when typing part of top-level domain - DNA-101876 Promote 91 to stable - Update to 90.0.4480.107 - DNA-100664 Shopping corner widget - DNA-101495 Performance Stint 2022 - DNA-101753 News dont show after close browser - DNA-101799 Crash at opera::SuggestionList::SortAndCull Affected Software/OS: 'opera' package(s) on openSUSE Leap 15.4:NonFree. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-3196 https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html https://crbug.com/1358090 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ https://security.gentoo.org/glsa/202209-23 Common Vulnerability Exposure (CVE) ID: CVE-2022-3197 https://crbug.com/1358075 Common Vulnerability Exposure (CVE) ID: CVE-2022-3198 https://crbug.com/1355682 Common Vulnerability Exposure (CVE) ID: CVE-2022-3199 http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html https://crbug.com/1355237 Common Vulnerability Exposure (CVE) ID: CVE-2022-3200 https://crbug.com/1355103 Common Vulnerability Exposure (CVE) ID: CVE-2022-3201 https://security.gentoo.org/glsa/202311-11 https://crbug.com/1343104 https://security.gentoo.org/glsa/202210-16 https://www.debian.org/security/2022/dsa-5244 |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |