First published: Mon May 03 2021(Updated: )
A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
Credit: yangkang &zerokeeper&bianliang @dnpushme 360 ATAyangkang &zerokeeper&bianliang @dnpushme 360 ATAyangkang &zerokeeper&bianliang @dnpushme 360 ATA product-security@apple.com yangkang &zerokeeper&bianliang @dnpushme 360 ATAyangkang &zerokeeper&bianliang @dnpushme 360 ATAyangkang &zerokeeper&bianliang @dnpushme 360 ATA product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <14.1 | 14.1 |
debian/webkit2gtk | 2.36.4-1~deb10u1 2.38.6-0+deb10u1 2.40.5-1~deb11u1 2.42.1-1~deb11u2 2.40.5-1~deb12u1 2.42.1-1~deb12u1 2.42.1-2 | |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.42.1-1 | |
Apple macOS Big Sur | <11.3.1 | 11.3.1 |
Apple watchOS | <7.4.1 | 7.4.1 |
Apple iPadOS | <14.5.1 | |
Apple iPhone OS | <12.5.3 | |
Apple iPhone OS | >=13.0<14.5.1 | |
Apple macOS | <11.3.1 | |
Apple tvOS | <14.6 | |
Apple watchOS | <7.4.1 | |
Apple tvOS | <14.6 | 14.6 |
Apple iOS | <12.5.3 | 12.5.3 |
Apple iOS | <14.5.1 | 14.5.1 |
Apple iPadOS | <14.5.1 | 14.5.1 |
Apple Multiple Products | ||
<14.5.1 | ||
<12.5.3 | ||
>=13.0<14.5.1 | ||
<11.3.1 | ||
<14.6 | ||
<7.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this Apple Multiple Products vulnerability is CVE-2021-30665.
Apple iOS, iPadOS, macOS, watchOS, and tvOS are affected by this vulnerability.
The severity of CVE-2021-30665 is not specified.
To fix this vulnerability, update your Apple device to the recommended versions as mentioned in the Apple support links provided.
You can find more information about this vulnerability in the Apple support links provided.