Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200712-22 ] Opera: Multiple vulnerabilities
Date: Sun, 30 Dec 2007 17:31:18
Message-Id: 4777D29F.9020004@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200712-22
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: Opera: Multiple vulnerabilities
12 Date: December 30, 2007
13 Bugs: #202770
14 ID: 200712-22
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 Multiple vulnerabilities were discovered in Opera, allowing for the
22 execution of arbitrary code and cross domain scripting.
23
24 Background
25 ==========
26
27 Opera is a fast Web browser that is available free of charge.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 www-client/opera < 9.25 >= 9.25
36
37 Description
38 ===========
39
40 David Bloom reported two vulnerabilities where plug-ins (CVE-2007-6520)
41 and Rich text editing (CVE-2007-6522) could be used to allow cross
42 domain scripting. Alexander Klink (Cynops GmbH) discovered an issue
43 with TLS certificates (CVE-2007-6521). Gynvael Coldwind reported that
44 bitmaps might reveal random data from memory (CVE-2007-6524).
45
46 Impact
47 ======
48
49 A remote attacker could exploit these vulnerabilites, possibly leading
50 to the execution of arbitrary code and cross domain scripting.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All Opera users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=www-client/opera-9.25"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2007-6520
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6520
70 [ 2 ] CVE-2007-6521
71 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6521
72 [ 3 ] CVE-2007-6522
73 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6522
74 [ 4 ] CVE-2007-6524
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6524
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 http://security.gentoo.org/glsa/glsa-200712-22.xml
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2007 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5
104 -----BEGIN PGP SIGNATURE-----
105 Version: GnuPG v1.4.7 (GNU/Linux)
106 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
107
108 iD8DBQFHd9KfuhJ+ozIKI5gRAr0iAJ9wF5YhZ3B2T9jsJiE/1uK10Uf1swCeJk5p
109 cwmBruk15tQBOvmnfRqySSk=
110 =DhPV
111 -----END PGP SIGNATURE-----
112 --
113 gentoo-announce@g.o mailing list