CVE-2021-30535

Publication date 7 June 2021

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

8.8 · High

Score breakdown

Double free in ICU in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Read the notes from the security team

Status

Package Ubuntu Release Status
chromium-browser 22.04 LTS jammy
Not affected
21.10 impish
Not affected
21.04 hirsute
Not affected
20.10 groovy
Not affected
20.04 LTS focal
Not affected
18.04 LTS bionic
Fixed 91.0.4472.77-0ubuntu0.18.04.1
16.04 LTS xenial Ignored end of standard support
14.04 LTS trusty Not in release
icu 22.04 LTS jammy
Not affected
21.10 impish
Not affected
21.04 hirsute
Fixed 67.1-6ubuntu2.1
20.04 LTS focal
Fixed 66.1-2ubuntu2.1
18.04 LTS bionic
Not affected
16.04 LTS xenial
Not affected
14.04 LTS trusty
Not affected

Notes


alexmurray

The Debian chromium source package is called chromium-browser in Ubuntu


mdeslaur

starting with Ubuntu 19.10, the chromium-browser package is just a script that installs the Chromium snap


rodrigo-zaiden

ICU issue was introduced in commit https://github.com/unicode-org/icu/commit/596647c0, released in version 66.1. So, trusty, xenial and bionic are not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
icu

Severity score breakdown

Parameter Value
Base score 8.8 · High
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

Other references