openSUSE 15 Security Update : opera (openSUSE-SU-2024:0223-1)

high Nessus Plugin ID 204810

Language:

Synopsis

The remote openSUSE host is missing one or more security updates.

Description

The remote openSUSE 15 host has a package installed that is affected by multiple vulnerabilities as referenced in the openSUSE-SU-2024:0223-1 advisory.

- Update to 112.0.5197.25
* CHR-9787 Update Chromium on desktop-stable-126-5197 to 126.0.6478.127
- The update to chromium 126.0.6478.127 fixes following issues:
CVE-2024-6290, CVE-2024-6291, CVE-2024-6292, CVE-2024-6293

- Update to 112.0.5197.24
* CHR-9762 Update Chromium on desktop-stable-126-5197 to 126.0.6478.62
* DNA-117001 Crash at base::internal::check_is_test_impl (base::NotFatalUntil)
* DNA-117050 [Settings][Sync] Synchronization options aren't visible
* DNA-117076 [Player] Background of the icons has changed and the Tidal icon is now missing
* DNA-117109 Browser freezes when trying to remove a tab
* DNA-117181 Translations for O112
* DNA-117202 Crash at syncer::SyncServiceImpl::NotifyObservers()
* DNA-117295 Remove emoji names field in picker
* DNA-117347 Start page is not rendered on first switch to workspace after its creation
* DNA-117431 Promote 112 to stable
- Complete Opera 112 changelog at:
https://blogs.opera.com/desktop/changelog-for-112
- The update to chromium >= 126.0.6478.54 fixes following issues:
CVE-2024-5830, CVE-2024-5831, CVE-2024-5832, CVE-2024-5833, CVE-2024-5834, CVE-2024-5835, CVE-2024-5836, CVE-2024-5837, CVE-2024-5838, CVE-2024-5839, CVE-2024-5840, CVE-2024-5841, CVE-2024-5842, CVE-2024-5843, CVE-2024-5844, CVE-2024-5845, CVE-2024-5846, CVE-2024-5847

- Update to 111.0.5168.55
* DNA-116749 Unnecessary icons in the advanced sync settings
* DNA-116961 Evaluate #vtvd-as-platform-sw-decoder in the field
* DNA-117003 #vtvd-as-platform-sw-decoder is not registered in media unittests

Update to 111.0.5168.43

* DNA-115228 Adblocker is blocking ads when turned off
* DNA-116605 Crash at opera::BrowserContentsView::
NonClientHitTestPoint(gfx::Point const&)
* DNA-116855 Cannot close tab islands tab when popup was hovered
* DNA-116885 Add chrome.cookies api permission to Rich Hints
* DNA-116948 [Linux] Theme toggle in settings is not working

Update to 111.0.5168.25

* CHR-9754 Update Chromium on desktop-stable-125-5168 to 125.0.6422.142
* DNA-116089 [Win/Lin] Fullscreen view has rounded corners
* DNA-116208 The red dot on the Arias icon is misaligned
* DNA-116693 X (twitter) logo is not available on opera:about page
* DNA-116737 [Bookmarks] Bookmarks bar favicon have light theme color in new window
* DNA-116769 Extension popup pin icon is replaced
* DNA-116850 Fix full package installer link
* DNA-116852 Promote 111 to stable
* DNA-116491 Site info popup is cut with dropdown opened
* DNA-116661 [opera:settings] IPFS/IPNS Gateway box has the wrong design
* DNA-116789 Translations for O111
* DNA-116813 [React emoji picker] Flag emojis are not load correctly
* DNA-116893 Put 'Show emojis in tab tooltip' in Settings
* DNA-116918 Translations for 'Show emojis in tab tooltip'

- Complete Opera 111 changelog at:
https://blogs.opera.com/desktop/changelog-for-111

- The update to chromium 125.0.6422.142 fixes following issues:
CVE-2024-5493, CVE-2024-5494, CVE-2024-5495, CVE-2024-5496, CVE-2024-5497, CVE-2024-5498, CVE-2024-5499

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected opera package.

See Also

http://www.nessus.org/u?c26249d3

https://www.suse.com/security/cve/CVE-2024-5493

https://www.suse.com/security/cve/CVE-2024-5494

https://www.suse.com/security/cve/CVE-2024-5495

https://www.suse.com/security/cve/CVE-2024-5496

https://www.suse.com/security/cve/CVE-2024-5497

https://www.suse.com/security/cve/CVE-2024-5498

https://www.suse.com/security/cve/CVE-2024-5499

https://www.suse.com/security/cve/CVE-2024-5830

https://www.suse.com/security/cve/CVE-2024-5831

https://www.suse.com/security/cve/CVE-2024-5832

https://www.suse.com/security/cve/CVE-2024-5833

https://www.suse.com/security/cve/CVE-2024-5834

https://www.suse.com/security/cve/CVE-2024-5835

https://www.suse.com/security/cve/CVE-2024-5836

https://www.suse.com/security/cve/CVE-2024-5837

https://www.suse.com/security/cve/CVE-2024-5838

https://www.suse.com/security/cve/CVE-2024-5839

https://www.suse.com/security/cve/CVE-2024-5840

https://www.suse.com/security/cve/CVE-2024-5841

https://www.suse.com/security/cve/CVE-2024-5842

https://www.suse.com/security/cve/CVE-2024-5843

https://www.suse.com/security/cve/CVE-2024-5844

https://www.suse.com/security/cve/CVE-2024-5845

https://www.suse.com/security/cve/CVE-2024-5846

https://www.suse.com/security/cve/CVE-2024-5847

https://www.suse.com/security/cve/CVE-2024-6290

https://www.suse.com/security/cve/CVE-2024-6291

https://www.suse.com/security/cve/CVE-2024-6292

https://www.suse.com/security/cve/CVE-2024-6293

Plugin Details

Severity: High

ID: 204810

File Name: openSUSE-2024-0223-1.nasl

Version: 1.2

Type: local

Agent: unix

Published: 7/27/2024

Updated: 8/16/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-5847

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:opensuse:15.6, p-cpe:/a:novell:opensuse:opera

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/26/2024

Vulnerability Publication Date: 5/30/2024

Reference Information

CVE: CVE-2024-5493, CVE-2024-5494, CVE-2024-5495, CVE-2024-5496, CVE-2024-5497, CVE-2024-5498, CVE-2024-5499, CVE-2024-5830, CVE-2024-5831, CVE-2024-5832, CVE-2024-5833, CVE-2024-5834, CVE-2024-5835, CVE-2024-5836, CVE-2024-5837, CVE-2024-5838, CVE-2024-5839, CVE-2024-5840, CVE-2024-5841, CVE-2024-5842, CVE-2024-5843, CVE-2024-5844, CVE-2024-5845, CVE-2024-5846, CVE-2024-5847, CVE-2024-6290, CVE-2024-6291, CVE-2024-6292, CVE-2024-6293