First published: Mon May 24 2021(Updated: )
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.
Credit: an anonymous researcher mipu94 SEFCOM labASU. Trend Micro Zero Day InitiativeJack Dates @ret2systems RET2 Systems Incan anonymous researcher mipu94 SEFCOM labASU. Trend Micro Zero Day InitiativeJack Dates @ret2systems RET2 Systems Incan anonymous researcher mipu94 SEFCOM labASU. Trend Micro Zero Day InitiativeJack Dates @ret2systems RET2 Systems Incan anonymous researcher mipu94 SEFCOM labASU. Trend Micro Zero Day InitiativeJack Dates @ret2systems RET2 Systems Incan anonymous researcher mipu94 SEFCOM labASU. Trend Micro Zero Day InitiativeJack Dates @ret2systems RET2 Systems Inc product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple tvOS | <14.6 | 14.6 |
Apple Safari | <14.1.1 | 14.1.1 |
Apple Safari | <14.1.1 | |
Apple iPadOS | <14.6 | |
Apple iPhone OS | <14.6 | |
Apple macOS | >=11.0<11.4 | |
Apple tvOS | <14.6 | |
Apple watchOS | <7.5 | |
debian/webkit2gtk | 2.36.4-1~deb10u1 2.38.6-0+deb10u1 2.40.5-1~deb11u1 2.42.1-1~deb11u2 2.40.5-1~deb12u1 2.42.1-1~deb12u1 2.42.1-2 | |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.42.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2021-30749.
The affected software includes Apple tvOS 14.6, Apple watchOS 7.5, Apple Safari 14.1.1, Apple macOS Big Sur 11.4, Apple iOS 14.6, and Apple iPadOS 14.6.
The severity of CVE-2021-30749 is not specified.
The remedy for CVE-2021-30749 is to update to the specified versions of the affected software.
You can find more information about CVE-2021-30749 on the following references: [URL1], [URL2], [URL3].