From https://secunia.com/advisories/51331/ : Description A weakness and a vulnerability have been reported in Opera, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system. 1) The vulnerability is caused due to an error when handling HTTP responses and can be exploited to cause a heap-based buffer overflow. Successful exploitation of this vulnerability may allow execution of arbitrary code. 2) The weakness is caused due to an error when handling error pages and can be exploited to determine the presence of local files. The weakness and the vulnerability are reported in versions prior to 12.11. Solution Update to version 12.11.
Security - Fixed an issue where HTTP response heap buffer overflow could allow execution of arbitrary code; see our advisory[1] - Fixed an issue where error pages could be used to guess local file paths; see our advisory[2] [1] http://www.opera.com/support/kb/view/1036/ , the same as https://secunia.com/advisories/51331/ [2] http://www.opera.com/support/kb/view/1037/ Arch teams, please test and mark stable: =www-client/opera-12.11.1661 Stable KEYWORDS : amd64 x86
amd64 stable
x86 stable
Added to existing GLSA request.
CVE-2012-6469 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6469): Opera before 12.11 allows remote attackers to determine the existence of arbitrary local files via vectors involving web script in an error page. CVE-2012-6468 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6468): Heap-based buffer overflow in Opera before 12.11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long HTTP response.
This issue was resolved and addressed in GLSA 201406-14 at http://security.gentoo.org/glsa/glsa-201406-14.xml by GLSA coordinator Chris Reffett (creffett).