ArchLinux: 202104-2: vivaldi: multiple issues
Summary
- CVE-2021-21201 (sandbox escape)
Use after free in permissions in Google Chrome prior to 90.0.4430.72
allowed a remote attacker who had compromised the renderer process to
potentially perform a sandbox escape via a crafted HTML page.
- CVE-2021-21202 (sandbox escape)
Use after free in extensions in Google Chrome prior to 90.0.4430.72
allowed an attacker who convinced a user to install a malicious
extension to potentially perform a sandbox escape via a crafted Chrome
Extension.
- CVE-2021-21203 (arbitrary code execution)
Use after free in Blink in Google Chrome prior to 90.0.4430.72 allowed
a remote attacker to potentially exploit heap corruption via a crafted
HTML page.
- CVE-2021-21207 (sandbox escape)
Use after free in IndexedDB in Google Chrome prior to 90.0.4430.72
allowed an attacker who convinced a user to install a malicious
extension to potentially perform a sandbox escape via a crafted Chrome
Extension.
- CVE-2021-21209 (information disclosure)
Inappropriate implementation in storage in Google Chrome prior to
90.0.4430.72 allowed a remote attacker to leak cross-origin data via a
crafted HTML page.
- CVE-2021-21210 (information disclosure)
Inappropriate implementation in Network in Google Chrome prior to
90.0.4430.72 allowed a remote attacker to potentially access local UDP
ports via a crafted HTML page.
- CVE-2021-21213 (arbitrary code execution)
Use after free in WebMIDI in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to potentially exploit heap corruption via a
crafted HTML page.
- CVE-2021-21214 (arbitrary code execution)
Use after free in Network API in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to potentially exploit heap corruption via a
crafted Chrome Extension.
- CVE-2021-21215 (content spoofing)
Inappropriate implementation in Autofill in Google Chrome prior to
90.0.4430.72 allowed a remote attacker to spoof security UI via a
crafted HTML page.
- CVE-2021-21216 (content spoofing)
Inappropriate implementation in Autofill in Google Chrome prior to
90.0.4430.72 allowed a remote attacker to spoof security UI via a
crafted HTML page.
- CVE-2021-21217 (information disclosure)
Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to obtain potentially sensitive information
from process memory via a crafted PDF file.
- CVE-2021-21218 (information disclosure)
Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to obtain potentially sensitive information
from process memory via a crafted PDF file.
- CVE-2021-21219 (information disclosure)
Uninitialized data in PDFium in Google Chrome prior to 90.0.4430.72
allowed a remote attacker to obtain potentially sensitive information
from process memory via a crafted PDF file.
- CVE-2021-21221 (information disclosure)
Insufficient validation of untrusted input in Mojo in Google Chrome
prior to 90.0.4430.72 allowed a remote attacker who had compromised the
renderer process to leak cross-origin data via a crafted HTML page.
- CVE-2021-21222 (sandbox escape)
Heap buffer overflow in V8 in Google Chrome prior to 90.0.4430.85
allowed a remote attacker who had compromised the renderer process to
bypass site isolation via a crafted HTML page.
- CVE-2021-21223 (sandbox escape)
Integer overflow in Mojo in Google Chrome prior to 90.0.4430.85 allowed
a remote attacker who had compromised the renderer process to
potentially perform a sandbox escape via a crafted HTML page.
- CVE-2021-21225 (arbitrary code execution)
Out of bounds memory access in V8 in Google Chrome prior to
90.0.4430.85 allowed a remote attacker to potentially exploit heap
corruption via a crafted HTML page.
- CVE-2021-21226 (sandbox escape)
Use after free in navigation in Google Chrome prior to 90.0.4430.85
allowed a remote attacker who had compromised the renderer process to
potentially perform a sandbox escape via a crafted HTML page.
- CVE-2021-21227 (insufficient validation)
An insufficient data validation security issue has been found in the V8
component of the Chromium browser before version 90.0.4430.93.
- CVE-2021-21228 (access restriction bypass)
An insufficient policy enforcement security issue has been found in the
extensions component of the Chromium browser before version
90.0.4430.93.
- CVE-2021-21229 (content spoofing)
An incorrect security UI security issue has been found in the downloads
component of the Chromium browser before version 90.0.4430.93.
- CVE-2021-21230 (incorrect calculation)
A type confusion security issue has been found in the V8 component of
the Chromium browser before version 90.0.4430.93.
- CVE-2021-21231 (incorrect calculation)
An insufficient data validation security issue has been found in the V8
component of the Chromium browser before version 90.0.4430.93.
- CVE-2021-21232 (arbitrary code execution)
A use after free security issue has been found in the Dev Tools
component of the Chromium browser before version 90.0.4430.93.
- CVE-2021-21233 (arbitrary code execution)
A heap buffer overflow security issue has been found in the ANGLE
component of the Chromium browser before version 90.0.4430.93.
Resolution
Upgrade to 3.8.2259.37-1.
# pacman -Syu "vivaldi>=3.8.2259.37-1"
The problems have been fixed upstream in version 3.8.2259.37.
References
https://vivaldi.com/blog/desktop/minor-update-3-for-vivaldi-desktop-browser-3-7/ https://vivaldi.com/blog/desktop/minor-update-4-for-vivaldi-desktop-browser-3-7/ https://vivaldi.com/blog/new-vivaldi-on-android-language-switcher-blocks-cookies-dialogs/ https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_20.html https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://security.archlinux.org/CVE-2021-21201 https://security.archlinux.org/CVE-2021-21202 https://security.archlinux.org/CVE-2021-21203 https://security.archlinux.org/CVE-2021-21207 https://security.archlinux.org/CVE-2021-21209 https://security.archlinux.org/CVE-2021-21210 https://security.archlinux.org/CVE-2021-21213 https://security.archlinux.org/CVE-2021-21214 https://security.archlinux.org/CVE-2021-21215 https://security.archlinux.org/CVE-2021-21216 https://security.archlinux.org/CVE-2021-21217 https://security.archlinux.org/CVE-2021-21218 https://security.archlinux.org/CVE-2021-21219 https://security.archlinux.org/CVE-2021-21221 https://security.archlinux.org/CVE-2021-21222 https://security.archlinux.org/CVE-2021-21223 https://security.archlinux.org/CVE-2021-21225 https://security.archlinux.org/CVE-2021-21226 https://security.archlinux.org/CVE-2021-21227 https://security.archlinux.org/CVE-2021-21228 https://security.archlinux.org/CVE-2021-21229 https://security.archlinux.org/CVE-2021-21230 https://security.archlinux.org/CVE-2021-21231 https://security.archlinux.org/CVE-2021-21232 https://security.archlinux.org/CVE-2021-21233
Workaround
None.