Summary: | <www-client/opera-10.61: Multiple vulnerabilities (CVE-2010-{2421,2455,2576,2658,2659,2660,2661,2662,3019,3020,3021},CVE-2011-1824) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.opera.com/docs/changelogs/unix/1061/ | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Jeroen Roovers (RETIRED)
2010-08-12 15:49:31 UTC
amd64 done x86 stable Marked ppc stable. GLSA with 283391. CVE-2011-1824 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1824): The VEGAOpBitmap::AddLine function in Opera before 10.61 does not properly initialize memory during processing of the SIZE attribute of a SELECT element, which allows remote attackers to trigger an invalid memory write operation, and consequently cause a denial of service (application crash) or possibly execute arbitrary code, via a large integer attribute value. CVE-2010-2576 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2576): Opera before 10.61 does not properly suppress clicks on download dialogs that became visible after a recent tab change, which allows remote attackers to conduct clickjacking attacks, and consequently execute arbitrary code, via vectors involving (1) closing a tab or (2) hiding a tab, a related issue to CVE-2005-2407. CVE-2010-3021 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3021): Unspecified vulnerability in Opera before 10.61 allows remote attackers to cause a denial of service (CPU consumption and application hang) via an animated PNG image. CVE-2010-3019 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3019): Heap-based buffer overflow in Opera before 10.61 allows remote attackers to execute arbitrary code or cause a denial of service (application crash or hang) via vectors related to HTML5 canvas painting operations that occur during the application of transformations. This issue was resolved and addressed in GLSA 201206-03 at http://security.gentoo.org/glsa/glsa-201206-03.xml by GLSA coordinator Sean Amoss (ackle). |