![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.18.1.2025.0012.1 |
Category: | openSUSE Local Security Checks |
Title: | openSUSE Security Advisory (openSUSE-SU-2025:0012-1) |
Summary: | The remote host is missing an update for the 'opera' package(s) announced via the openSUSE-SU-2025:0012-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'opera' package(s) announced via the openSUSE-SU-2025:0012-1 advisory. Vulnerability Insight: This update for opera fixes the following issues: - Update to 116.0.5366.21 * CHR-9904 Update Chromium on desktop-stable-131-5366 to 131.0.6778.86 * DNA-119581 Crash at views::View::ConvertPointToTarget * DNA-119847 Missing Opera warning color and some margins in Settings * DNA-119853 Eula dialog is wrong displayed and can not run installation with system scale 125% * DNA-119883 Dark mode: side bar player icons have no background * DNA-120054 Double icon effect in adress bar * DNA-120117 [Player] Crash when trying to Inspect Element on player's web page in panel * DNA-120155 Crash on opera:extensions with color-themes flag disabled * DNA-120195 Scroll in Theme Gallery view changes to dark color in Dark Mode * DNA-120211 Crash at extensions:: TabsPrivateGetAllInWindowFunction::Run * DNA-120230 Start page button is blurry * DNA-120240 Dropdown display lacks expected overlay effect * DNA-120242 Translations for Opera 116 * DNA-120317 Crash at opera::BrowserWindowImpl:: SetBrowserUIVisible * DNA-120458 Crash at opera::BrowserWindowImpl:: AddWidgetToTracked * DNA-120512 Promote 116.0 to stable - Complete Opera 116 changelog at: [link moved to references] - The update to chromium 131.0.6778.86 fixes following issues: CVE-2024-11395 - Update to 115.0.5322.119 * CHR-9416 Updating Chromium on desktop-stable-* branches * DNA-120117 [Player] Crash when trying to Inspect Element on player's web page in panel * DNA-120211 Crash at extensions:: TabsPrivateGetAllInWindowFunction::Run - Update to 115.0.5322.109 * CHR-9416 Updating Chromium on desktop-stable-* branches * DNA-118730 Crash at opera::content_filter:: AdBlockerWhitelistHandler::SetSiteBlocked * DNA-119320 [Mac] Web view corners not rounded * DNA-119421 [Easy setup] Dropdown for theme editing do not close after opening other dropdowns * DNA-119519 Implement stop mechanism for video as wallpaper * DNA-119550 Collect common shader rendering code in Rich Wallpaper * DNA-119551 Convert Midsommar to new shader-based dynamic theme format * DNA-119552 Convert Aurora to new shader-based dynamic theme format * DNA-119553 Pass configuration data to shader-based dynamic themes * DNA-119554 Logic for pause / resume animations in rich wallpaper page * DNA-119645 Install theme from the server * DNA-119652 Show spinner while downloading & installing theme * DNA-119692 'start now' button not translated in hindi * DNA-119783 Toggles in Dark Mode unchecked state missed background color * DNA-119811 Show download icon on hover * DNA-119812 Implement downloading new theme by clicking download button * DNA-119813 Implement selecting new theme by clicking tile * DNA-119814 Implement canceling theme download API * DNA-119815 Implement canceling theme download UI * DNA-119816 Handle error callback from download/install * DNA-119817 Implement ability to see themes being downloaded ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'opera' package(s) on openSUSE Leap 15.6. Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-11395 |
Copyright | Copyright (C) 2025 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |