Lucene search

K
suseSuseOPENSUSE-SU-2021:1310-1
HistorySep 25, 2021 - 12:00 a.m.

Security update for opera (important)

2021-09-2500:00:00
lists.opensuse.org
18

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

An update that fixes 19 vulnerabilities is now available.

Description:

This update for opera fixes the following issues:

opera was updated to version 79.0.4143.22

  • CHR-8550 Update chromium on desktop-stable-93-4143 to 93.0.4577.58

  • CHR-8557 Update chromium on desktop-stable-93-4143 to 93.0.4577.63

  • DNA-94641 [Linux] Proprietary media codecs not working in snap builds

  • DNA-95076 [Linux] Page crash with media content

  • DNA-95084 [Mac] Cannot quit through menu with snapshot editor open

  • DNA-95138 Add setting to synchronize Pinboards

  • DNA-95157 Crash at -[OperaCrApplication sendEvent:]

  • DNA-95204 Opera 79 translations

  • DNA-95240 The pinboard thumbnail cannot be generated anymore

  • DNA-95278 Existing Pinboards might be missing

  • DNA-95292 Enable #bookmarks-trash-cleaner on all streams

  • DNA-95293 Enable #easy-files-downloads-folder on all streams

  • DNA-95383 Promote O79 to stable

  • Complete Opera 79.0 changelog at:
    https://blogs.opera.com/desktop/changelog-for-79/

  • The update to chromium 93.0.4577.58 fixes following issues:
    CVE-2021-30606, CVE-2021-30607, CVE-2021-30608, CVE-2021-30609,
    CVE-2021-30610, CVE-2021-30611, CVE-2021-30612, CVE-2021-30613,
    CVE-2021-30614, CVE-2021-30615, CVE-2021-30616, CVE-2021-30617,
    CVE-2021-30618, CVE-2021-30619, CVE-2021-30620, CVE-2021-30621,
    CVE-2021-30622, CVE-2021-30623, CVE-2021-30624

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3:NonFree:

    zypper in -t patch openSUSE-2021-1310=1

  • openSUSE Leap 15.2:NonFree:

    zypper in -t patch openSUSE-2021-1310=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap NonFree15.3x86_64< - openSUSE Leap 15.3:NonFree (x86_64):- openSUSE Leap 15.3:NonFree (x86_64):.x86_64.rpm
openSUSE Leap NonFree15.2x86_64< - openSUSE Leap 15.2:NonFree (x86_64):- openSUSE Leap 15.2:NonFree (x86_64):.x86_64.rpm

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P