First published: Fri Aug 06 2021(Updated: )
Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
Credit: chrome-cve-admin@google.com Marcin Towalski Cisco Talos
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <93.0.4577.82 | 93.0.4577.82 |
Google Chrome (Trace Event) | <93.0.4577.82 | |
Fedora | =33 | |
Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30625 has been classified as a high-severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2021-30625, update Google Chrome to version 93.0.4577.82 or later.
CVE-2021-30625 affects Google Chrome versions prior to 93.0.4577.82, and Fedora 33 and 35.
Yes, CVE-2021-30625 can potentially be exploited by remote attackers through a crafted HTML page.
A use after free vulnerability, as seen in CVE-2021-30625, occurs when a program attempts to use memory after it has been freed, leading to heap corruption.