Subject: [ASA-202111-4] opera: multiple issues Arch Linux Security Advisory ASA-202111-4 ========================================= Severity: High Date : 2021-11-05 CVE-ID : CVE-2021-37981 CVE-2021-37982 CVE-2021-37983 CVE-2021-37984 CVE-2021-37985 CVE-2021-37986 CVE-2021-37987 CVE-2021-37988 CVE-2021-37989 CVE-2021-37990 CVE-2021-37991 CVE-2021-37992 CVE-2021-37993 CVE-2021-37994 CVE-2021-37995 CVE-2021-37996 Package : opera Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-2468 Summary ======= The package opera before version 81.0.4196.31-1 is vulnerable to multiple issues including arbitrary code execution, information disclosure and insufficient validation. Resolution ========== Upgrade to 81.0.4196.31-1. # pacman -Syu "opera>=81.0.4196.31-1" The problems have been fixed upstream in version 81.0.4196.31. Workaround ========== None. Description =========== - CVE-2021-37981 (arbitrary code execution) A heap buffer overflow security issue has been found in the Skia component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37982 (arbitrary code execution) A use after free security issue has been found in the Incognito component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37983 (arbitrary code execution) A use after free security issue has been found in the Dev Tools component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37984 (arbitrary code execution) A heap buffer overflow security issue has been found in the PDFium component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37985 (arbitrary code execution) A use after free security issue has been found in the V8 component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37986 (arbitrary code execution) A heap buffer overflow security issue has been found in the Settings component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37987 (arbitrary code execution) A use after free security issue has been found in the Network APIs component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37988 (arbitrary code execution) A use after free security issue has been found in the Profiles component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37989 (arbitrary code execution) An inappropriate implementation security issue has been found in the Blink component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37990 (arbitrary code execution) An inappropriate implementation security issue has been found in the WebView component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37991 (arbitrary code execution) A race security issue has been found in the V8 component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37992 (information disclosure) An out of bounds read security issue has been found in the WebAudio component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37993 (arbitrary code execution) A use after free security issue has been found in the PDF Accessibility component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37994 (arbitrary code execution) An inappropriate implementation security issue has been found in the iFrame Sandbox component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37995 (arbitrary code execution) An inappropriate implementation security issue has been found in the WebApp Installer component of the Chromium browser engine before version 95.0.4638.54. - CVE-2021-37996 (insufficient validation) An insufficient validation of untrusted input security issue has been found in the Downloads component of the Chromium browser engine before version 95.0.4638.54. Impact ====== A remote attacker could execute arbitrary code or disclose sensitive information through crafted web content. References ========== https://blogs.opera.com/desktop/changelog-for-80/ https://blogs.opera.com/desktop/changelog-for-81/ https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html https://crbug.com/1246631 https://crbug.com/1248661 https://crbug.com/1249810 https://crbug.com/1253399 https://crbug.com/1241860 https://crbug.com/1242404 https://crbug.com/1206928 https://crbug.com/1228248 https://crbug.com/1233067 https://crbug.com/1247395 https://crbug.com/1250660 https://crbug.com/1253746 https://crbug.com/1255332 https://crbug.com/1100761 https://crbug.com/1242315 https://crbug.com/1243020 https://security.archlinux.org/CVE-2021-37981 https://security.archlinux.org/CVE-2021-37982 https://security.archlinux.org/CVE-2021-37983 https://security.archlinux.org/CVE-2021-37984 https://security.archlinux.org/CVE-2021-37985 https://security.archlinux.org/CVE-2021-37986 https://security.archlinux.org/CVE-2021-37987 https://security.archlinux.org/CVE-2021-37988 https://security.archlinux.org/CVE-2021-37989 https://security.archlinux.org/CVE-2021-37990 https://security.archlinux.org/CVE-2021-37991 https://security.archlinux.org/CVE-2021-37992 https://security.archlinux.org/CVE-2021-37993 https://security.archlinux.org/CVE-2021-37994 https://security.archlinux.org/CVE-2021-37995 https://security.archlinux.org/CVE-2021-37996