ArchLinux: 202108-5: opera: multiple issues
Summary
- CVE-2021-30565 (arbitrary code execution)
An out of bounds write security issue has been found in the Tab Groups
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30566 (arbitrary code execution)
A stack buffer overflow security issue has been found in the Printing
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30567 (arbitrary code execution)
A use after free security issue has been found in the DevTools
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30568 (arbitrary code execution)
A heap buffer overflow security issue has been found in the WebGL
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30569 (arbitrary code execution)
A use after free security issue has been found in the sqlite component
of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30571 (access restriction bypass)
An insufficient policy enforcement security issue has been found in the
DevTools component of the Chromium browser engine before version
92.0.4515.107.
- CVE-2021-30572 (arbitrary code execution)
A use after free security issue has been found in the Autofill
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30573 (arbitrary code execution)
A use after free security issue has been found in the GPU component of
the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30574 (arbitrary code execution)
A use after free security issue has been found in the protocol handling
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30575 (information disclosure)
An out of bounds read security issue has been found in the Autofill
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30576 (arbitrary code execution)
A use after free security issue has been found in the DevTools
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30578 (arbitrary code execution)
An uninitialized use security issue has been found in the Media
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30579 (arbitrary code execution)
A use after free security issue has been found in the UI framework
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30581 (arbitrary code execution)
A use after free security issue has been found in the DevTools
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30582 (incorrect calculation)
An inappropriate implementation security issue has been found in the
Animation component of the Chromium browser engine before version
92.0.4515.107.
- CVE-2021-30584 (content spoofing)
An incorrect security UI security issue has been found in the Downloads
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30585 (arbitrary code execution)
A use after free security issue has been found in the sensor handling
component of the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30588 (incorrect calculation)
A type confusion security issue has been found in the V8 component of
the Chromium browser engine before version 92.0.4515.107.
- CVE-2021-30589 (insufficient validation)
An insufficient validation of untrusted input security issue has been
found in the Sharing component of the Chromium browser engine before
version 92.0.4515.107.
Resolution
Upgrade to 78.0.4093.112-1.
# pacman -Syu "opera>=78.0.4093.112-1"
The problems have been fixed upstream in version 78.0.4093.112.
References
https://blogs.opera.com/desktop/changelog-for-77/ https://blogs.opera.com/desktop/changelog-for-78/ https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html https://security.archlinux.org/CVE-2021-30565 https://security.archlinux.org/CVE-2021-30566 https://security.archlinux.org/CVE-2021-30567 https://security.archlinux.org/CVE-2021-30568 https://security.archlinux.org/CVE-2021-30569 https://security.archlinux.org/CVE-2021-30571 https://security.archlinux.org/CVE-2021-30572 https://security.archlinux.org/CVE-2021-30573 https://security.archlinux.org/CVE-2021-30574 https://security.archlinux.org/CVE-2021-30575 https://security.archlinux.org/CVE-2021-30576 https://security.archlinux.org/CVE-2021-30578 https://security.archlinux.org/CVE-2021-30579 https://security.archlinux.org/CVE-2021-30581 https://security.archlinux.org/CVE-2021-30582 https://security.archlinux.org/CVE-2021-30584 https://security.archlinux.org/CVE-2021-30585 https://security.archlinux.org/CVE-2021-30588 https://security.archlinux.org/CVE-2021-30589
![Dist Arch](/images/distros/dist-arch.png)
Workaround
None.