blob: 80491b0e5df1582c66a9db7ed957a1af2b0f7d7c [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200804-14">
<title>Opera: Multiple vulnerabilities</title>
Multiple vulnerabilities have been discovered in Opera, allowing for
execution of arbitrary code.
<product type="ebuild">opera</product>
<announced>April 14, 2008</announced>
<revised>April 14, 2008: 01</revised>
<package name="www-client/opera" auto="yes" arch="*">
<unaffected range="ge">9.27</unaffected>
<vulnerable range="lt">9.27</vulnerable>
Opera is a fast web browser that is available free of charge.
Michal Zalewski reported two vulnerabilities, memory corruption when
adding news feed sources from a website (CVE-2008-1761) as well as when
processing HTML CANVAS elements to use scaled images (CVE-2008-1762).
Additionally, an unspecified weakness related to keyboard handling of
password inputs has been reported (CVE-2008-1764).
<impact type="normal">
A remote attacker could entice a user to visit a specially crafted web
site or news feed and possibly execute arbitrary code with the
privileges of the user running Opera.
There is no known workaround at this time.
All Opera users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-client/opera-9.27&quot;</code>
<uri link="">CVE-2008-1761</uri>
<uri link="">CVE-2008-1762</uri>
<uri link="">CVE-2008-1764</uri>
<metadata tag="submitter" timestamp="Sun, 13 Apr 2008 00:02:37 +0000">
<metadata tag="bugReady" timestamp="Sun, 13 Apr 2008 00:02:49 +0000">