First published: Mon May 24 2021(Updated: )
A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.
Credit: Marcin Towalski Cisco TalosMarcin Towalski Cisco TalosMarcin Towalski Cisco TalosMarcin Towalski Cisco TalosMarcin Towalski Cisco Talos talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/webkit2gtk | 2.36.4-1~deb10u1 2.38.6-0+deb10u1 2.40.5-1~deb11u1 2.42.1-1~deb11u2 2.40.5-1~deb12u1 2.42.1-1~deb12u1 2.42.1-2 | |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.42.1-1 | |
WebKitGTK WebKitGTK | =2.30.4 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =10.0 | |
Apple watchOS | <7.5 | 7.5 |
Apple macOS Big Sur | <11.4 | 11.4 |
Apple iOS | <14.6 | 14.6 |
Apple iPadOS | <14.6 | 14.6 |
Apple tvOS | <14.6 | 14.6 |
Apple Safari | <14.1.1 | 14.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-21779 is a vulnerability in WebKit that allows for a use after free issue due to a memory management flaw.
CVE-2021-21779 affects Apple tvOS versions up to and exclusive of 14.6, Apple watchOS versions up to and exclusive of 7.5, Apple Safari versions up to and exclusive of 14.1.1, Apple macOS Big Sur versions up to and exclusive of 11.4, Apple iOS versions up to and exclusive of 14.6, and Apple iPadOS versions up to and exclusive of 14.6.
To fix the use after free issue in CVE-2021-21779, update to the latest version of the affected software.
More information about CVE-2021-21779 can be found on the Apple support website at the following links: [link1], [link2], [link3].
CWE-416 is a common weakness enumeration reference for use after free vulnerabilities.