First published: Sun May 23 2021(Updated: )
Use after free in Spell check in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
Credit: chrome-cve-admin@google.com David Erceg
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <91.0.4472.101 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Google Chrome | <91.0.4472.101 | 91.0.4472.101 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30549 has a high severity rating due to the potential for heap corruption and exploitation via malicious extensions.
To fix CVE-2021-30549, update Google Chrome to version 91.0.4472.101 or later.
Google Chrome versions prior to 91.0.4472.101 are affected by CVE-2021-30549.
Yes, CVE-2021-30549 can be exploited if a user installs a malicious extension designed to trigger the vulnerability.
CVE-2021-30549 impacts Google Chrome on various operating systems including Fedora 33 and 34.