Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 348874 - <www-client/opera-11.00_pre1156 - several vulnerabilities (CVE-2010-{4579,4580,4581,4582,4583,4584,4585,4586})
Summary: <www-client/opera-11.00_pre1156 - several vulnerabilities (CVE-2010-{4579,458...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.opera.com/docs/changelogs/...
Whiteboard: B4 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2010-12-16 15:27 UTC by Jeroen Roovers (RETIRED)
Modified: 2012-06-15 17:40 UTC (History)
5 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jeroen Roovers (RETIRED) gentoo-dev 2010-12-16 15:27:55 UTC
* Fixed an issue where Web page content could display misleading security information; see our advisory[1].
* Fixed an issue which could allow leaking of WAP form content to other sites; see our advisory[2].
* Fixed a high severity issue; details will be disclosed at a later date.
* Fixed further high severity issues; details will be disclosed at a later date.

[1] http://www.opera.com/support/search/view/977/
[2] http://www.opera.com/support/search/view/979/
Comment 1 Jeroen Roovers (RETIRED) gentoo-dev 2010-12-16 15:35:36 UTC
Arch teams, please test and mark stable:
=www-client/opera-11.00_pre1156
Target KEYWORDS="amd64 x86"

Before anyone asks: PPC support was dropped some time ago[1].


[1] http://my.opera.com/desktopteam/blog/2010/08/30/tea
Comment 2 Thomas Kahle (RETIRED) gentoo-dev 2010-12-16 16:20:53 UTC
x86 done. Thanks!
Comment 3 Christian Faulhammer (RETIRED) gentoo-dev 2010-12-16 23:23:47 UTC
What about the final release?  Is it identical to this pre-release?
Comment 4 ta2002 2010-12-17 15:53:17 UTC
The final release does have "1156" in the version number.
Comment 5 Jeroen Roovers (RETIRED) gentoo-dev 2010-12-17 16:37:14 UTC
(In reply to comment #4)
> The final release does have "1156" in the version number.

Correct.
Comment 6 Jeroen Roovers (RETIRED) gentoo-dev 2010-12-17 16:39:08 UTC
(In reply to comment #3)
> What about the final release?  Is it identical to this pre-release?

This is the final release. Maybe I should switch to a different versioning scheme, as leaving _pre in there also has its downsides.
Comment 7 Agostino Sarubbo gentoo-dev 2010-12-17 22:09:15 UTC
amd64 ok
Comment 8 Markos Chandras (RETIRED) gentoo-dev 2010-12-18 12:07:47 UTC
amd64 done. Thanks Agostino
Comment 9 Nikolaj Šujskij 2010-12-18 12:41:26 UTC
(In reply to comment #6)
> (In reply to comment #3)
> > What about the final release?  Is it identical to this pre-release?
> 
> This is the final release. Maybe I should switch to a different versioning
> scheme, as leaving _pre in there also has its downsides.
> 

 I think leaving _pre${NUM} is confusing. It's stable release and there's little need in messing up upstream versioning. We could keep the SRC_URI the same, of course, but ~arch/Opera users hardly will mind re-unpacking tarballs.
Comment 10 Tim Sammut (RETIRED) gentoo-dev 2010-12-18 17:41:41 UTC
Thanks, folks.

GLSA Vote: Yes, because of:

* Fixed a high severity issue; details will be disclosed at a later date.
* Fixed further high severity issues; details will be disclosed at a later
date.
Comment 11 Felix Blanke 2010-12-18 21:42:42 UTC
I don't know if this is the right place to complain:

It is really bad that 10.63 isnt in portage anymore. There is a huge bug in opera 11 for linux, which let opera crash like every 2 minutes. I allready reported that bug to opera. But for now opera 11 is unusable for users who hit that bug :/
Comment 12 Christian Faulhammer (RETIRED) gentoo-dev 2010-12-18 23:42:33 UTC
(In reply to comment #11)
> I don't know if this is the right place to complain:
> 
> It is really bad that 10.63 isnt in portage anymore. There is a huge bug in
> opera 11 for linux, which let opera crash like every 2 minutes. I allready
> reported that bug to opera. But for now opera 11 is unusable for users who hit
> that bug :/

 We would leave the majority of users that do not hit that error with a possible source of error regarding a security vulnerability.  You can restore 10.63 in a local overlay if you want.

Comment 13 Felix Blanke 2010-12-23 14:06:03 UTC
Thats a good point :)

Does anybody know where to get the 10.63 ebuild? I can't find it in the web :/
Comment 14 Denilson Sá Maia 2010-12-23 14:08:43 UTC
(In reply to comment #13) 
> Does anybody know where to get the 10.63 ebuild? I can't find it in the web :/

http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/www-client/opera/

Then click on "Show dead files"
Comment 15 Stefan Behte (RETIRED) gentoo-dev Security 2011-02-23 22:44:04 UTC
Added to pending glsa.
Comment 16 GLSAMaker/CVETool Bot gentoo-dev 2011-06-14 09:18:46 UTC
CVE-2010-4586 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4586):
  The default configuration of Opera before 11.00 enables WebSockets
  functionality, which has unspecified impact and remote attack vectors,
  possibly a related issue to CVE-2010-4508.

CVE-2010-4585 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4585):
  Unspecified vulnerability in the auto-update functionality in Opera before
  11.00 allows remote attackers to cause a denial of service (application
  crash) by triggering an Opera Unite update.

CVE-2010-4584 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4584):
  Opera before 11.00, when Opera Turbo is used, does not properly present
  information about problematic X.509 certificates on https web sites, which
  might make it easier for remote attackers to spoof trusted content via a
  crafted web site.

CVE-2010-4583 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4583):
  Opera before 11.00, when Opera Turbo is enabled, does not display a page's
  security indication, which makes it easier for remote attackers to spoof
  trusted content via a crafted web site.

CVE-2010-4582 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4582):
  Opera before 11.00 does not properly handle security policies during updates
  to extensions, which might allow remote attackers to bypass intended access
  restrictions via unspecified vectors.

CVE-2010-4581 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4581):
  Unspecified vulnerability in Opera before 11.00 has unknown impact and
  attack vectors, related to "a high severity issue."

CVE-2010-4580 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4580):
  Opera before 11.00 does not clear WAP WML form fields after manual
  navigation to a new web site, which allows remote attackers to obtain
  sensitive information via an input field that has the same name as an input
  field on a previously visited web site.

CVE-2010-4579 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4579):
  Opera before 11.00 does not properly constrain dialogs to appear on top of
  rendered documents, which makes it easier for remote attackers to trick
  users into interacting with a crafted web site that spoofs the (1) security
  information dialog or (2) download dialog.
Comment 17 GLSAMaker/CVETool Bot gentoo-dev 2012-06-15 17:40:53 UTC
This issue was resolved and addressed in
 GLSA 201206-03 at http://security.gentoo.org/glsa/glsa-201206-03.xml
by GLSA coordinator Sean Amoss (ackle).