Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
References
Link | Resource |
---|---|
https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html | Release Notes Vendor Advisory |
https://crbug.com/1237533 | Permissions Required Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352 | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 03:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
09 Dec 2021, 19:58
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352 - Exploit, Third Party Advisory |
30 Nov 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Nov 2021, 21:48
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* |
17 Nov 2021, 22:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Nov 2021, 01:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Oct 2021, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Oct 2021, 23:16
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ - Mailing List, Third Party Advisory | |
References | (MISC) https://crbug.com/1237533 - Permissions Required, Vendor Advisory | |
References | (MISC) https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html - Release Notes, Vendor Advisory | |
CWE | CWE-416 | |
CPE | cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
09 Oct 2021, 03:35
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Oct 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-08 21:15
Updated : 2023-12-10 14:09
NVD link : CVE-2021-30625
Mitre link : CVE-2021-30625
CVE.ORG link : CVE-2021-30625
JSON object : View
Products Affected
- chrome
fedoraproject
- fedora
CWE
CWE-416
Use After Free