ArchLinux: 202106-47: vivaldi: arbitrary code execution
Summary
- CVE-2021-30554 (arbitrary code execution)
A use after free security issue has been found in the WebGL component
of the Chromium browser engine before version 91.0.4472.114. Google is
aware that an exploit for CVE-2021-30554 exists in the wild.
- CVE-2021-30555 (arbitrary code execution)
A use after free security issue has been found in the Sharing component
of the Chromium browser engine before version 91.0.4472.114.
- CVE-2021-30556 (arbitrary code execution)
A use after free security issue has been found in the WebAudio
component of the Chromium browser engine before version 91.0.4472.114.
- CVE-2021-30557 (arbitrary code execution)
A use after free security issue has been found in the TabGroups
component of the Chromium browser engine before version 91.0.4472.114.
Resolution
Upgrade to 4.0.2312.33-1.
# pacman -Syu "vivaldi>=4.0.2312.33-1"
The problems have been fixed upstream in version 4.0.2312.33.
References
https://vivaldi.com/blog/desktop/minor-update-for-vivaldi-desktop-browser-4-0/ https://vivaldi.com/blog/desktop/minor-update-3-for-vivaldi-desktop-browser-4-0/ https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop_17.html https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://bugs.chromium.org/p/chromium/issues/detail https://security.archlinux.org/CVE-2021-30554 https://security.archlinux.org/CVE-2021-30555 https://security.archlinux.org/CVE-2021-30556 https://security.archlinux.org/CVE-2021-30557
Workaround
None.