Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "chromium-browser", "binary_version": "94.0.4606.71-0ubuntu0.18.04.1" }, { "binary_name": "chromium-browser-dbgsym", "binary_version": "94.0.4606.71-0ubuntu0.18.04.1" }, { "binary_name": "chromium-browser-l10n", "binary_version": "94.0.4606.71-0ubuntu0.18.04.1" }, { "binary_name": "chromium-chromedriver", "binary_version": "94.0.4606.71-0ubuntu0.18.04.1" }, { "binary_name": "chromium-chromedriver-dbgsym", "binary_version": "94.0.4606.71-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg", "binary_version": "94.0.4606.71-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg-dbgsym", "binary_version": "94.0.4606.71-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg-extra", "binary_version": "94.0.4606.71-0ubuntu0.18.04.1" }, { "binary_name": "chromium-codecs-ffmpeg-extra-dbgsym", "binary_version": "94.0.4606.71-0ubuntu0.18.04.1" } ], "ubuntu_priority": "medium" }