First published: Wed Aug 18 2021(Updated: )
Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.
Credit: chrome-cve-admin@google.com Jaehun Jeong @n3sk Theori
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome (Trace Event) | <93.0.4577.82 | 93.0.4577.82 |
Google Chrome (Trace Event) | <93.0.4577.82 | |
Fedora | =33 | |
Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30628 is classified as a high-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2021-30628, update Google Chrome to version 93.0.4577.82 or later.
CVE-2021-30628 can allow attackers to exploit stack corruption, potentially leading to arbitrary code execution.
CVE-2021-30628 affects all Google Chrome versions prior to 93.0.4577.82.
CVE-2021-30628 is mainly relevant to Google Chrome but also affects Fedora 33 and 35 when using the browser.