ports/117268: Update www/opera to version 9.24

Arjan van Leeuwen freebsd-maintainer at opera.com
Wed Oct 17 12:20:03 UTC 2007


>Number:         117268
>Category:       ports
>Synopsis:       Update www/opera to version 9.24
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          maintainer-update
>Submitter-Id:   current-users
>Arrival-Date:   Wed Oct 17 12:20:02 UTC 2007
>Closed-Date:
>Last-Modified:
>Originator:     Arjan van Leeuwen
>Release:        FreeBSD 7.0-PRERELEASE amd64
>Organization:
Opera Software ASA 
>Environment:


System: FreeBSD 7.0-PRERELEASE #0: Tue Oct 16 17:22:02 CEST 2007
    root at avl.oslo.opera.com:/usr/obj/usr/src/sys/GENERIC



>Description:


This patch updates www/opera to version 9.24. This version plugs several security vulnerabilities.

More information here: http://www.opera.com/docs/changelogs/freebsd/924/

A vuxml patch is also included.


>How-To-Repeat:





>Fix:


--- opera.diff begins here ---
diff -urN /usr/ports/www/opera/Makefile opera/Makefile
--- /usr/ports/www/opera/Makefile	2007-10-04 08:21:45.000000000 +0200
+++ opera/Makefile	2007-10-17 13:45:03.000000000 +0200
@@ -28,11 +28,11 @@
 MAINTAINER=	freebsd-maintainer at opera.com
 COMMENT=	A blazingly fast, full-featured, standards-compliant browser
 
-OPERA_VER=	9.23
+OPERA_VER=	9.24
 OPERA_MINVER=
 OPERA_REL=	final
-OPERA_DATE=	20070809
-OPERA_BUILD=	660
+OPERA_DATE=	20071015
+OPERA_BUILD=	671
 
 DATADIR=	${PREFIX}/share/${PORTNAME}
 DOCSDIR=	${PREFIX}/share/doc/${PORTNAME}
diff -urN /usr/ports/www/opera/distinfo opera/distinfo
--- /usr/ports/www/opera/distinfo	2007-08-15 14:18:54.000000000 +0200
+++ opera/distinfo	2007-10-17 13:42:36.000000000 +0200
@@ -1,9 +1,9 @@
-MD5 (opera-9.23-20070809.1-static-qt.i386.freebsd-en.tar.bz2) = dddff7d9045a0e8b581cf69e68c10d28
-SHA256 (opera-9.23-20070809.1-static-qt.i386.freebsd-en.tar.bz2) = a5292cd809994ae0e02daa393f42edc658a570a2be279b6923f4fde880921c3f
-SIZE (opera-9.23-20070809.1-static-qt.i386.freebsd-en.tar.bz2) = 6547187
-MD5 (opera-9.23-20070809.3-shared-qt.i386.freebsd-en.tar.bz2) = a4387e74cc05549fd5b9b3641ba39a85
-SHA256 (opera-9.23-20070809.3-shared-qt.i386.freebsd-en.tar.bz2) = 7ab4ba5e1af6c96d32aeb4f1c5d1e7b6586719ba180a1deedac60894024955ea
-SIZE (opera-9.23-20070809.3-shared-qt.i386.freebsd-en.tar.bz2) = 5119513
-MD5 (opera-9.23-20070809.4-shared-qt.i386.freebsd-en.tar.bz2) = 6ff2bf3d6a90085a8795656375447699
-SHA256 (opera-9.23-20070809.4-shared-qt.i386.freebsd-en.tar.bz2) = d46f4402becd25e5a73239ec0cc129685749c4d5e0da6a0d00f3855b52997b82
-SIZE (opera-9.23-20070809.4-shared-qt.i386.freebsd-en.tar.bz2) = 5122054
+MD5 (opera-9.24-20071015.1-static-qt.i386.freebsd-en.tar.bz2) = 1d6b47c431a5cf405684744f144be251
+SHA256 (opera-9.24-20071015.1-static-qt.i386.freebsd-en.tar.bz2) = 334f744fee13810e6895477ba26b2f2e9a3a88cf99173f2100df0f325942ab02
+SIZE (opera-9.24-20071015.1-static-qt.i386.freebsd-en.tar.bz2) = 6549193
+MD5 (opera-9.24-20071015.3-shared-qt.i386.freebsd-en.tar.bz2) = fe92a4da6e943a0dacca1f49fba1ca5b
+SHA256 (opera-9.24-20071015.3-shared-qt.i386.freebsd-en.tar.bz2) = 4cc0b06051adcbc7900c6a24b8f36ab6e0931db89add3501eeab2c71ae74e67e
+SIZE (opera-9.24-20071015.3-shared-qt.i386.freebsd-en.tar.bz2) = 5121361
+MD5 (opera-9.24-20071015.4-shared-qt.i386.freebsd-en.tar.bz2) = ac8e536e9327a15dcb8f7dc8fd6c5bf1
+SHA256 (opera-9.24-20071015.4-shared-qt.i386.freebsd-en.tar.bz2) = c0bc7497a8114f13bda60fe14c9dd6ad732c1311cdc8d55597d67b09fe389593
+SIZE (opera-9.24-20071015.4-shared-qt.i386.freebsd-en.tar.bz2) = 5123101
--- opera.diff ends here ---
--- vuln.xml.diff begins here ---
--- vuln.xml.orig	2007-10-17 13:47:43.000000000 +0200
+++ vuln.xml	2007-10-17 13:58:26.000000000 +0200
@@ -34,6 +34,67 @@
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="24d8cb68-7ca8-11dc-bcc3-001372ae3ab9">
+    <topic>opera -- Scripts can overwrite functions on pages from other domains</topic>
+      <affects>
+        <package>
+          <name>opera</name>
+          <name>opera-devel</name>
+          <name>linux-opera</name>
+          <range><lt>9.24.20071015</lt></range>
+        </package>
+      </affects>
+      <description>
+        <body xmlns="http://www.w3.org/1999/xhtml">
+          <p>An advisory from Opera reports:</p>
+          <blockquote cite="http://www.opera.com/support/search/view/867/">
+            <p>Scripts can overwrite functions on pages from other domains.</p>
+            <p>When accesing frames from different Web sites, specially crafted scripts
+            can bypass the same-origin policy, and overwrite functions from those frames.
+            If scripts on the page then run those functions, this can cause the script of
+            the attacker's choice to run in the context of the target Web site.</p>
+          </blockquote>
+        </body>
+      </description>
+      <references>
+        <url>http://www.opera.com/support/search/view/867/</url>
+      </references>
+      <dates>
+        <discovery>2007-10-15</discovery>
+        <entry>2007-10-17</entry>
+      </dates>
+  </vuln>
+
+  <vuln vid="195703eb-7ca8-11dc-bcc3-001372ae3ab9">
+    <topic>opera -- external news readers and e-mail clients can be used to execute arbitrary code</topic>
+      <affects>
+        <package>
+          <name>opera</name>
+          <name>opera-devel</name>
+	  <name>linux-opera</name>
+	  <range><lt>9.24.20071015</lt></range>
+        </package>
+      </affects>
+      <description>
+        <body xmlns="http://www.w3.org/1999/xhtml">
+          <p>An advisory from Opera reports:</p>
+	  <blockquote cite="http://www.opera.com/support/search/view/866/">
+	    <p>External news readers and e-mail clients can be used to execute arbitrary code.</p>
+	    <p>If a user has configured Opera to use an external newsgroup client or e-mail
+            application, specially crafted Web pages can cause Opera to run that application
+            incorrectly. In some cases this can lead to execution of arbitrary code.</p>
+          </blockquote>
+        </body>
+      </description>
+      <references>
+	<url>http://www.opera.com/support/search/view/866/</url>
+      </references>
+      <dates>
+        <discovery>2007-10-15</discovery>
+        <entry>2007-10-17</entry>
+      </dates>
+  </vuln>
+
   <vuln vid="51b51d4a-7c0f-11dc-9e47-0011d861d5e2">
     <topic>phpmyadmin -- cross-site scripting vulnerability</topic>
     <affects>
--- vuln.xml.diff ends here ---



>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list