Ebuild coming soon to a tree near you.
The ebuild is in the tree.
* Fixed an issue where History Search could be used to execute arbitrary code, as discovered by Aviv Raff; see our advisory
* The links panel no longer allows cross-site scripting; see our advisory
 http://www.opera.com/support/search/view/906/ "Extremely Severe"
 http://www.opera.com/support/search/view/907/ "Highly Severe"
Thanks, setting whiteboard and severity, CC'ing arches...
Arches, please test and stabilize:
Target keywords: "amd64 ppc x86"
We should note in our GLSA, that users may remain vulnerable even after upgrading, once the config has been manipulated by a malicious script (i.e. mailto handler for example).
We could create a script that checks for manipulation and warns the user...?
Comment written with opera 9.62 x86.
Seems to work just like older version.
(In reply to comment #5)
> We could create a script that checks for manipulation and warns the user...?
I don't think we want to go so far, people need to do forensics on their systems if someone exploited a security issue anyway. There are tons of cases where we cannot determine an exploit scenario via a script.
# ChangeLog for www-client/opera
# Copyright 2002-2008 Gentoo Foundation; Distributed under the GPL v2
# $Header: /var/cvsroot/gentoo-x86/www-client/opera/ChangeLog,v 1.303 2008/10/30 21:17:39 keytoaster Exp $
30 Oct 2008; Tobias Heinlein <email@example.com> opera-9.62.ebuild:
amd64 stable, security bug #244980
(In reply to comment #8)
> # ChangeLog for www-client/opera
> # Copyright 2002-2008 Gentoo Foundation; Distributed under the GPL v2
> # $Header: /var/cvsroot/gentoo-x86/www-client/opera/ChangeLog,v 1.303
> 2008/10/30 21:17:39 keytoaster Exp $
> 30 Oct 2008; Tobias Heinlein <firstname.lastname@example.org> opera-9.62.ebuild:
> amd64 stable, security bug #244980
Oops, forgot to report on the bug. Thanks!
Opera before 9.62 allows remote attackers to execute arbitrary
commands via the History Search results page, a different
vulnerability than CVE-2008-4696.
context of the "outermost page" of a frame, which allows remote
attackers to inject arbitrary web script or HTML via cross-site
scripting (XSS) attacks.
pong, all arches done.
GLSA 200811-01, thanks everyone.