First published: Mon May 24 2021(Updated: )
A buffer overflow was addressed with improved size validation. This issue is fixed in macOS Big Sur 11.4, tvOS 14.6, watchOS 7.5, iOS 14.6 and iPadOS 14.6. An application may be able to execute arbitrary code with kernel privileges.
Credit: Ian Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <14.6 | |
Apple iPhone OS | <14.6 | |
Apple macOS | >=11.0.1<11.4 | |
Apple tvOS | <14.6 | |
Apple watchOS | <7.5 | |
Apple macOS Big Sur | <11.4 | 11.4 |
Apple watchOS | <7.5 | 7.5 |
Apple iOS | <14.6 | 14.6 |
Apple iPadOS | <14.6 | 14.6 |
Apple tvOS | <14.6 | 14.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30736 is a vulnerability in the Kernel that allows a buffer overflow to occur due to insufficient size validation.
CVE-2021-30736 has a severity rating of high due to the potential for arbitrary code execution.
CVE-2021-30736 affects Apple tvOS 14.6, Apple watchOS 7.5, Apple macOS Big Sur 11.4, Apple iOS 14.6, and Apple iPadOS 14.6.
To fix CVE-2021-30736, update your Apple tvOS, watchOS, macOS, iOS, or iPadOS to the specified versions mentioned in the affected software section.
You can find more information about CVE-2021-30736 on the Apple support website. Here are the references: [Apple Support Website](https://support.apple.com/en-us/HT212533), [Apple Support Website](https://support.apple.com/en-us/HT212529), [Apple Support Website](https://support.apple.com/en-us/HT212528)