= Security = * Fixed an issue where hidden keyboard navigation could allow cross site scripting or code execution, as reported by Jordi Chancel; see our advisory[1] * Fixed an issue where a combination of clicks and key presses could lead to cross site scripting or code execution, as reported by Jordi Chancel; see our advisory[2] * Fixed an issue where cross-domain JSON resources may be exposed as JavaScript variable data; see our advisory[3] * Fixed an issue where carefully timed reloads, redirects, and navigation could spoof the address field, as reported by Jordi Chancel; see our advisory[4] * Fixed an issue where pages could prevent navigation to a target page, spoofing the address field, as reported by Code Audit Labs of vulnhunt.com; see our advisory[5] [1] http://www.opera.com/support/kb/view/1021/ [2] http://www.opera.com/support/kb/view/1020/ [3] http://www.opera.com/support/kb/view/1019/ [4] http://www.opera.com/support/kb/view/1018/ [5] http://www.opera.com/support/kb/view/1022/ Arch teams, please test and mark stable: =www-client/opera-12.00.1467 Target KEYWORDS="amd64 x86"
x86: Compile and run everything fine. Compile with USE flags: also without problems (all RDEPEND compile is ok). No complaints from repoman. Please mark stable for x86.
amd64 stable
x86 stable
Thanks, everyone. Adding to existing GLSA request.
CVE-2012-3560 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3560): Opera before 11.65 does not ensure that the address field corresponds to the displayed web page during blocked navigation, which makes it easier for remote attackers to conduct spoofing attacks by detecting and preventing attempts to load a different web page. CVE-2012-3558 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3558): Opera before 11.65 does not ensure that the address field corresponds to the displayed web page during unusually timed changes to this field, which makes it easier for user-assisted remote attackers to conduct spoofing attacks via vectors involving navigation, reloads, and redirects. CVE-2012-3557 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3557): Opera before 11.65 does not properly restrict the reading of JSON strings, which allows remote attackers to perform cross-domain loading of JSON resources and consequently obtain sensitive information via a crafted web site. CVE-2012-3556 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3556): Opera before 11.65 does not properly restrict the opening of a pop-up window in response to the first click of a double-click action, which makes it easier for user-assisted remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web site. CVE-2012-3555 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3555): Opera before 11.65 does not ensure that keyboard sequences are associated with a visible window, which makes it easier for user-assisted remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary code via a crafted web site, related to a "hidden keyboard navigation" issue.
This issue was resolved and addressed in GLSA 201206-03 at http://security.gentoo.org/glsa/glsa-201206-03.xml by GLSA coordinator Sean Amoss (ackle).