First published: Sat Mar 13 2021(Updated: )
Use after free in WebRTC in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
Credit: chrome-cve-admin@google.com Tolyan Korniltsev
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <91.0.4472.77 | 91.0.4472.77 |
Google Chrome (Trace Event) | <91.0.4472.77 | |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30523 is classified as a high severity vulnerability due to its potential for exploitation and the risks associated with heap corruption.
To fix CVE-2021-30523, upgrade Google Chrome to version 91.0.4472.77 or later.
CVE-2021-30523 affects users of Google Chrome versions prior to 91.0.4472.77 and certain versions of Fedora including 33 and 34.
The impact of CVE-2021-30523 includes potential remote code execution via crafted SCTP packets, leading to compromised systems.
CVE-2021-30523 was disclosed as part of a series of updates in May 2021.