CVE-2021-30625

Name
CVE-2021-30625
Description
Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://crbug.com/1237533
MISC https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/
Exploit https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* chrome >= None < 93.0.4577.82

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
chromium 3.14-community 93.0.4577.82-r0 Natanael Copa <ncopa@alpinelinux.org> fixed