openSUSE 15 Security Update : opera (openSUSE-SU-2024:0205-1)

high Nessus Plugin ID 202753

Language:

Synopsis

The remote openSUSE host is missing one or more security updates.

Description

The remote openSUSE 15 host has a package installed that is affected by multiple vulnerabilities as referenced in the openSUSE-SU-2024:0205-1 advisory.

- Update to 112.0.5197.25

* CHR-9787 Update Chromium on desktop-stable-126-5197 to 126.0.6478.127

- The update to chromium 126.0.6478.127 fixes following issues:
CVE-2024-6290, CVE-2024-6291, CVE-2024-6292, CVE-2024-6293

- Update to 112.0.5197.24

* CHR-9762 Update Chromium on desktop-stable-126-5197 to 126.0.6478.62
* DNA-117001 Crash at base::internal::check_is_test_impl (base::NotFatalUntil)
* DNA-117050 [Settings][Sync] Synchronization options aren't visible
* DNA-117076 [Player] Background of the icons has changed and the Tidal icon is now missing
* DNA-117109 Browser freezes when trying to remove a tab
* DNA-117181 Translations for O112
* DNA-117202 Crash at syncer::SyncServiceImpl::NotifyObservers()
* DNA-117295 Remove emoji names field in picker
* DNA-117347 Start page is not rendered on first switch to workspace after its creation
* DNA-117431 Promote 112 to stable

- Complete Opera 112 changelog at:
https://blogs.opera.com/desktop/changelog-for-112

- The update to chromium >= 126.0.6478.54 fixes following issues:
CVE-2024-5830, CVE-2024-5831, CVE-2024-5832, CVE-2024-5833, CVE-2024-5834, CVE-2024-5835, CVE-2024-5836, CVE-2024-5837, CVE-2024-5838, CVE-2024-5839, CVE-2024-5840, CVE-2024-5841, CVE-2024-5842, CVE-2024-5843, CVE-2024-5844, CVE-2024-5845, CVE-2024-5846, CVE-2024-5847

- Update to 111.0.5168.55
* DNA-116749 Unnecessary icons in the advanced sync settings
* DNA-116961 Evaluate #vtvd-as-platform-sw-decoder in the field
* DNA-117003 #vtvd-as-platform-sw-decoder is not registered in media unittests

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected opera package.

See Also

http://www.nessus.org/u?46d8ba9b

https://www.suse.com/security/cve/CVE-2024-5830

https://www.suse.com/security/cve/CVE-2024-5831

https://www.suse.com/security/cve/CVE-2024-5832

https://www.suse.com/security/cve/CVE-2024-5833

https://www.suse.com/security/cve/CVE-2024-5834

https://www.suse.com/security/cve/CVE-2024-5835

https://www.suse.com/security/cve/CVE-2024-5836

https://www.suse.com/security/cve/CVE-2024-5837

https://www.suse.com/security/cve/CVE-2024-5838

https://www.suse.com/security/cve/CVE-2024-5839

https://www.suse.com/security/cve/CVE-2024-5840

https://www.suse.com/security/cve/CVE-2024-5841

https://www.suse.com/security/cve/CVE-2024-5842

https://www.suse.com/security/cve/CVE-2024-5843

https://www.suse.com/security/cve/CVE-2024-5844

https://www.suse.com/security/cve/CVE-2024-5845

https://www.suse.com/security/cve/CVE-2024-5846

https://www.suse.com/security/cve/CVE-2024-5847

https://www.suse.com/security/cve/CVE-2024-6290

https://www.suse.com/security/cve/CVE-2024-6291

https://www.suse.com/security/cve/CVE-2024-6292

https://www.suse.com/security/cve/CVE-2024-6293

Plugin Details

Severity: High

ID: 202753

File Name: openSUSE-2024-0205-1.nasl

Version: 1.2

Type: local

Agent: unix

Published: 7/22/2024

Updated: 8/16/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-5847

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:opera, cpe:/o:novell:opensuse:15.5

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/20/2024

Vulnerability Publication Date: 6/11/2024

Reference Information

CVE: CVE-2024-5830, CVE-2024-5831, CVE-2024-5832, CVE-2024-5833, CVE-2024-5834, CVE-2024-5835, CVE-2024-5836, CVE-2024-5837, CVE-2024-5838, CVE-2024-5839, CVE-2024-5840, CVE-2024-5841, CVE-2024-5842, CVE-2024-5843, CVE-2024-5844, CVE-2024-5845, CVE-2024-5846, CVE-2024-5847, CVE-2024-6290, CVE-2024-6291, CVE-2024-6292, CVE-2024-6293