Google fixes 2 zero-days (CVE-2021-30632 and CVE-2021-30633) and several high severity vulnerabilities in Chrome 93.0.4577.82 stable channel update

Google fixes 2 zero-days (CVE-2021-30632 and CVE-2021-30633) and several high severity vulnerabilities in Chrome 93.0.4577.82 stable channel update

Hello everyone,

 

Chrome stable channel has been updated to 93.0.4577.82 for Windows, macOS, and Linux. This update comes with fixes for 11 security vulnerabilities out of which CVE-2021-30632 and CVE-2021-30633 are exploited in the wild. The details of the vulnerabilities fixed are as follows:


 CVE ID Vulnerability Severity
 CVE-2021-30625 Use after free in Selection API High
 CVE-2021-30626 Out of bounds memory access in ANGLE High
 CVE-2021-30627 Type Confusion in Blink layout High
 CVE-2021-30628 Stack buffer overflow in ANGLE High
 CVE-2021-30629 Use after free in Permissions High
 CVE-2021-30630 Inappropriate implementation in Blink High
 CVE-2021-30631 Type Confusion in Blink layout High
 CVE-2021-30632 Out of bounds write in V8 High
 CVE-2021-30633 Use after free in Indexed DB API High

 

To install this update on your Windows machines, initiate a sync between the Central Patch Repository and the Desktop Central server. Once the sync is complete, search for the following Patch IDs or Bulletin ID and deploy them to your target systems.


 Patch ID Bulletin ID Patch Description
 321383 TU-017 Google Chrome (93.0.4577.82) 
 321384 TU-017 Google Chrome (x64) (93.0.4577.82)

Cheers,

The ManageEngine Team

                New to ADSelfService Plus?