Opera Software patched a trio of bugs in its flagship browser Tuesday, including one that a company manager used last week to slam rival Mozilla.
The update, dubbed Opera 9.26, plugs three security vulnerabilities. The most serious is rated "highly severe" by the Oslo-based developer and could be used by attackers to dupe the browser into treating image-file comments as script. "This can cause the script to be run in the wrong security context," Opera's advisory read.
But it was another, less-dangerous bug that raised the ire of Claudio Santambrogio, Opera's quality assurance desktop test manager. In a post to a company blog last Thursday, Santambrogio used the flaw to take Mozilla to task.
"Mozilla notified us of one security issue the day before they published their public advisory," said Santambrogio. "They did not wait for us to come back with an ETA for a fix. They kept their bug reports containing the details of the exploits closed to the public for a few days, and now opened most of them to everybody."
The bug, which was one of 11 that Mozilla patched 7 February when it released Firefox 126.96.36.199, could let attackers spoof input fields. Mozilla said that the vulnerability could be used to dupe users into unwittingly uploading malicious code; Opera's advisory agreed.
Although Santambrogio claimed that Mozilla had opened the vulnerability's Bugzilla entry - and thus disclosed details of the bug before Opera was able to patch - the entry is currently locked. It is inaccessible even to users with a general Bugzilla account.
Santambrogio seemed to knock Mozilla for not abiding by the unwritten rule of "responsible disclosure", which requires that researchers wait until vendors patch a bug before revealing details of the vulnerability. "Opera is as always committed to not only protecting its users, but to making the web a safe place. We believe in responsible [emphasis in original] disclosure of vulnerabilities affecting several vendors," he said.
Mozilla said it would not comment on the dust up.