First published: Wed Sep 08 2021(Updated: )
Google Chromium Indexed DB API contains a use-after-free vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
Credit: chrome-cve-admin@google.com chrome-cve-admin@google.com Anonymous chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <93.0.4577.82 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =35 | |
Google Chrome | <93.0.4577.82 | 93.0.4577.82 |
Google Chromium Indexed DB API | ||
<93.0.4577.82 | ||
=33 | ||
=35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30633 is a use-after-free vulnerability in the Google Chromium Indexed DB API that allows a remote attacker to potentially perform a sandbox escape.
Web browsers that utilize Chromium, including Google Chrome and Fedora versions 33 and 35, are affected by CVE-2021-30633.
CVE-2021-30633 has a severity value of 9.6, which is considered critical.
A remote attacker who has compromised the renderer process can potentially perform a sandbox escape by using a crafted HTML page.
Yes, you can find more information about CVE-2021-30633 in the following references: [Google Chrome Releases](https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html), [Chromium Bug Tracker](https://crbug.com/1247766), [Fedora Project](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/).