Arch teams, please test and mark stable: =www-client/opera-10.61 Target KEYWORDS="amd64 ppc x86 " * Arches to go stable: - 3 - * Fixed an issue where heap buffer overflow in HTML5 canvas could be used to execute arbitrary code, as reported by Kuzzcc; see our advisory[1]. * Fixed an issue where unexpected changes in tab focus could be used to run programs from the Internet, as reported by Jakob Balle and Sven Krewitt of Secunia; see our advisory[2]. * Fixed an issue where news feed preview could subscribe to feeds without interaction, as reported by Alexios Fakos; see our advisory[3]. [1] http://www.opera.com/support/search/view/966/ [2] http://www.opera.com/support/search/view/967/ [3] http://www.opera.com/support/search/view/968/
amd64 done
x86 stable
Marked ppc stable.
GLSA with 283391.
CVE-2011-1824 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1824): The VEGAOpBitmap::AddLine function in Opera before 10.61 does not properly initialize memory during processing of the SIZE attribute of a SELECT element, which allows remote attackers to trigger an invalid memory write operation, and consequently cause a denial of service (application crash) or possibly execute arbitrary code, via a large integer attribute value.
CVE-2010-2576 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2576): Opera before 10.61 does not properly suppress clicks on download dialogs that became visible after a recent tab change, which allows remote attackers to conduct clickjacking attacks, and consequently execute arbitrary code, via vectors involving (1) closing a tab or (2) hiding a tab, a related issue to CVE-2005-2407.
CVE-2010-3021 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3021): Unspecified vulnerability in Opera before 10.61 allows remote attackers to cause a denial of service (CPU consumption and application hang) via an animated PNG image. CVE-2010-3019 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3019): Heap-based buffer overflow in Opera before 10.61 allows remote attackers to execute arbitrary code or cause a denial of service (application crash or hang) via vectors related to HTML5 canvas painting operations that occur during the application of transformations.
This issue was resolved and addressed in GLSA 201206-03 at http://security.gentoo.org/glsa/glsa-201206-03.xml by GLSA coordinator Sean Amoss (ackle).