Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200804-14 ] Opera: Multiple vulnerabilities
Date: Mon, 14 Apr 2008 23:22:57
Message-Id: 200804150103.13391.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200804-14
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Opera: Multiple vulnerabilities
9 Date: April 14, 2008
10 Bugs: #216022
11 ID: 200804-14
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been discovered in Opera, allowing for
19 execution of arbitrary code.
20
21 Background
22 ==========
23
24 Opera is a fast web browser that is available free of charge.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 www-client/opera < 9.27 >= 9.27
33
34 Description
35 ===========
36
37 Michal Zalewski reported two vulnerabilities, memory corruption when
38 adding news feed sources from a website (CVE-2008-1761) as well as when
39 processing HTML CANVAS elements to use scaled images (CVE-2008-1762).
40 Additionally, an unspecified weakness related to keyboard handling of
41 password inputs has been reported (CVE-2008-1764).
42
43 Impact
44 ======
45
46 A remote attacker could entice a user to visit a specially crafted web
47 site or news feed and possibly execute arbitrary code with the
48 privileges of the user running Opera.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All Opera users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=www-client/opera-9.27"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2008-1761
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1761
68 [ 2 ] CVE-2008-1762
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1762
70 [ 3 ] CVE-2008-1764
71 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1764
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200804-14.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2008 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature