First published: Mon Jul 19 2021(Updated: )
FontParser. A stack overflow was addressed with improved input validation.
Credit: hjy79425575 Trend Micro Zero Day Initiativehjy79425575 Trend Micro Zero Day Initiativehjy79425575 Trend Micro Zero Day Initiativehjy79425575 Trend Micro Zero Day Initiativehjy79425575 Trend Micro Zero Day Initiative product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.5 | 11.5 |
tvOS | <14.7 | 14.7 |
macOS Catalina | ||
macOS Mojave | ||
Apple iOS, iPadOS, and watchOS | <7.6 | 7.6 |
Apple iOS, iPadOS, and macOS | <14.7 | |
iPhone OS | <14.7 | |
Apple iOS and macOS | =10.14 | |
Apple iOS and macOS | =10.14.0 | |
Apple iOS and macOS | =10.14.1 | |
Apple iOS and macOS | =10.14.2 | |
Apple iOS and macOS | =10.14.3 | |
Apple iOS and macOS | =10.14.4 | |
Apple iOS and macOS | =10.14.5 | |
Apple iOS and macOS | =10.14.6 | |
Apple iOS and macOS | =10.14.6-security_update_2019-001 | |
Apple iOS and macOS | =10.14.6-security_update_2019-002 | |
Apple iOS and macOS | =10.14.6-security_update_2019-004 | |
Apple iOS and macOS | =10.14.6-security_update_2019-005 | |
Apple iOS and macOS | =10.14.6-security_update_2019-006 | |
Apple iOS and macOS | =10.14.6-security_update_2019-007 | |
Apple iOS and macOS | =10.14.6-security_update_2020-001 | |
Apple iOS and macOS | =10.14.6-security_update_2020-002 | |
Apple iOS and macOS | =10.14.6-security_update_2020-003 | |
Apple iOS and macOS | =10.14.6-security_update_2020-004 | |
Apple iOS and macOS | =10.14.6-security_update_2020-005 | |
Apple iOS and macOS | =10.14.6-security_update_2020-006 | |
Apple iOS and macOS | =10.14.6-security_update_2020-007 | |
Apple iOS and macOS | =10.14.6-security_update_2021-001 | |
Apple iOS and macOS | =10.14.6-security_update_2021-002 | |
Apple iOS and macOS | =10.14.6-security_update_2021-003 | |
Apple iOS and macOS | =10.14.6-security_update_2021-004 | |
Apple iOS and macOS | =10.14.6-supplemental_update | |
Apple iOS and macOS | =10.14.6-supplemental_update_2 | |
Apple iOS and macOS | =10.15 | |
Apple iOS and macOS | =10.15.1 | |
Apple iOS and macOS | =10.15.2 | |
Apple iOS and macOS | =10.15.3 | |
Apple iOS and macOS | =10.15.4 | |
Apple iOS and macOS | =10.15.5 | |
Apple iOS and macOS | =10.15.6 | |
Apple iOS and macOS | =10.15.6-supplemental_update | |
Apple iOS and macOS | =10.15.7 | |
Apple iOS and macOS | =10.15.7-security_update_2020 | |
Apple iOS and macOS | =10.15.7-security_update_2020-001 | |
Apple iOS and macOS | =10.15.7-security_update_2020-005 | |
Apple iOS and macOS | =10.15.7-security_update_2020-007 | |
Apple iOS and macOS | =10.15.7-security_update_2021-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-002 | |
Apple iOS and macOS | =10.15.7-security_update_2021-003 | |
Apple iOS and macOS | =10.15.7-supplemental_update | |
macOS | >=11.0<11.5 | |
tvOS | <14.7 | |
Apple iOS, iPadOS, and watchOS | <7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30759 is a vulnerability in the FontParser component that allowed for a stack overflow, which has been addressed with improved input validation.
CVE-2021-30759 affects Apple Mojave, Apple WatchOS up to version 7.6, Apple tvOS up to version 14.7, Apple Catalina, and Apple macOS Big Sur up to version 11.5.
The severity of CVE-2021-30759 is not provided in the given information.
To fix the CVE-2021-30759 vulnerability, make sure to update your software to the latest version provided by Apple.
More information about CVE-2021-30759 can be found on the official Apple support website at the provided references.