Google Chrome fixes one Zero-day CVE-2021-30551 along with other vulnerabilities in its stable channel 91.0.4472.101 update
Hello everyone,
Chrome stable channel has been updated to 91.0.4472.101 for Windows, macOS, and Linux. This update comes with fixes for 14 security vulnerabilities along with one actively exploited Zero-day vulnerability tracked as CVE-2021-30551. This zero-day was utilized by the same threat actors using the Windows CVE-2021-33742 zero-day fixed yesterday by Microsoft.
The details of the vulnerabilities fixed are as follows:
CVE ID
| Vulnerability
| Severity
|
CVE-2021-30544
| Use after free in BFCache
| Critical
|
CVE-2021-30545
| Use after free in Extensions
| High
|
CVE-2021-30546
| Use after free in Autofill
| High
|
CVE-2021-30547
| Out of bounds write in ANGLE
| High
|
CVE-2021-30548
| Use after free in Loader
| High
|
CVE-2021-30549
| Use after free in Spell check
| High
|
CVE-2021-30550
| Use after free in Accessibility
| High
|
CVE-2021-30551
| Type Confusion in V8
| High
|
CVE-2021-30552
| Use after free in Extensions
| Medium
|
CVE-2021-30553
| Use after free in Network service
| Medium
|
To install these updates using Vulnerability Manager Plus, initiate a sync between the Central Patch Repository and the Vulnerability Manager Plus server. Once the sync is complete, search for the following Patch IDs or Bulletin ID and deploy them to your target systems.
Patch ID
| Bulletin ID
| Patch Description
|
320003
| TU-017
| Google Chrome (91.0.4472.101)
|
320004
| TU-017
| Google Chrome (x64) (91.0.4472.101)
|
Cheers,
The ManageEngine Team
New to ADSelfService Plus?