Multiple vulnerabilities have been found in Opera, the worst of which may allow remote execution of arbitrary code.
|Package||www-client/opera on all architectures|
|Affected versions||< 12.01.1532|
|Unaffected versions||>= 12.01.1532|
Opera is a fast web browser that is available free of charge.
Multiple vulnerabilities have been discovered in Opera. Please review the CVE identifiers and Opera Release Notes referenced below for details.
A remote attacker could entice a user to open a specially crafted web page using Opera, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to trick a user into downloading and executing files, conduct Cross-Site Scripting (XSS) attacks, spoof the address bar, or have other unspecified impact.
There is no known workaround at this time.
All Opera users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-client/opera-12.01.1532"