8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
An update that fixes three vulnerabilities is now available.
Description:
This update for opera fixes the following issues:
opera was updated to version 80.0.4170.16
Fixes:
- CHR-8590 Update chromium on desktop-stable-94-4170 to 94.0.4606.61
- DNA-95347 Make InstallerStep::Run async
- DNA-95420 First suggestion in address field is often not highlighted
- DNA-95613 Browser closing itself after closing SD/first tab and last
opened tab
- DNA-95725 Promote O80 to stable
- DNA-95781 Import fixes for CVE-2021-37975, CVE-2021-37976 and
CVE-2021-37974 to desktop-stable-94-4170
Opera was updated to version 79.0.4143.72
Fixes:
- DNA-94933 Add emoji panel to address bar
- DNA-95210 Add emoji YAT address bar suggestions
- DNA-95221 Emoji button stuck in address bar
- DNA-95325 Make y.at navigations to be reported with page_views events
- DNA-95327 Add ���Emojis��� context menu option in address bar field
- DNA-95339 Add YAT emoji url suggestion to search�� dialog
- DNA-95364 Add browser feature flag
- DNA-95416 Remove emoji button from address bar
- DNA-95439 Enable #yat-emoji-addresses on developer stream
- DNA-95441 [Mac big sur] Emoji are not shown in address bar url
- DNA-95445 Crash when removing unsynced pinboard bookmark with sync
enabled
- DNA-95512 Allow to show title and timer for simple banners
- DNA-95516 Wrong label in settings for themes
- DNA-95679 Temporarily disable AB test for a new autoupdater logic
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Leap 15.3:NonFree:
zypper in -t patch openSUSE-2021-1358=1
openSUSE Leap 15.2:NonFree:
zypper in -t patch openSUSE-2021-1358=1
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE Leap NonFree | 15.3 | x86_64 | < - openSUSE Leap 15.3:NonFree (x86_64): | - openSUSE Leap 15.3:NonFree (x86_64):.x86_64.rpm | |
openSUSE Leap NonFree | 15.2 | x86_64 | < - openSUSE Leap 15.2:NonFree (x86_64): | - openSUSE Leap 15.2:NonFree (x86_64):.x86_64.rpm |
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P