<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="74cc3d906e7554b295e021cfbb7be468"!-->
<update status="stable" from="maint-coord@suse.de" type="security" version="366">
  <id>dbg111-opera</id>
  <title>opera security update</title>
  <release>openSUSE 11.1</release>
  <issued date="1229530913"/>
  <references>
    <reference href="https://bugzilla.novell.com/show_bug.cgi?id=459404" id="459404" title="bug number 459404" type="bugzilla"/>
  </references>
  <description>Opera 9.63 fixes the following security problems:

- Manipulating text input contents can allow execution of
  arbitrary code

- HTML parsing flaw can cause Opera to execute arbitrary
  code.

- Long hostnames in file: URLs can cause execution of
  arbitrary code.

- Script injection in feed preview can reveal contents of
  unrelated news feeds.

- Built-in XSLT templates can allow cross-site scripting.

- Fixed an issue that could reveal random data.

- SVG images embedded using &lt;img&gt; tags can no longer
  execute Java or plugin content.
</description>
  <pkglist>
    <collection>
        <package name="opera" arch="i586" version="9.63" release="1.1">
          <filename>opera-9.63-1.1.i586.rpm</filename>
        </package>
    </collection>
  </pkglist>
</update>
