First published: Mon Jul 19 2021(Updated: )
FontParser. A stack overflow was addressed with improved input validation.
Credit: hjy79425575 Trend Micro Zero Day Initiativehjy79425575 Trend Micro Zero Day Initiativehjy79425575 Trend Micro Zero Day Initiativehjy79425575 Trend Micro Zero Day Initiativehjy79425575 Trend Micro Zero Day Initiative product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <14.7 | |
Apple iPhone OS | <14.7 | |
Apple Mac OS X | =10.14 | |
Apple Mac OS X | =10.14.0 | |
Apple Mac OS X | =10.14.1 | |
Apple Mac OS X | =10.14.2 | |
Apple Mac OS X | =10.14.3 | |
Apple Mac OS X | =10.14.4 | |
Apple Mac OS X | =10.14.5 | |
Apple Mac OS X | =10.14.6 | |
Apple Mac OS X | =10.14.6-security_update_2019-001 | |
Apple Mac OS X | =10.14.6-security_update_2019-002 | |
Apple Mac OS X | =10.14.6-security_update_2019-004 | |
Apple Mac OS X | =10.14.6-security_update_2019-005 | |
Apple Mac OS X | =10.14.6-security_update_2019-006 | |
Apple Mac OS X | =10.14.6-security_update_2019-007 | |
Apple Mac OS X | =10.14.6-security_update_2020-001 | |
Apple Mac OS X | =10.14.6-security_update_2020-002 | |
Apple Mac OS X | =10.14.6-security_update_2020-003 | |
Apple Mac OS X | =10.14.6-security_update_2020-004 | |
Apple Mac OS X | =10.14.6-security_update_2020-005 | |
Apple Mac OS X | =10.14.6-security_update_2020-006 | |
Apple Mac OS X | =10.14.6-security_update_2020-007 | |
Apple Mac OS X | =10.14.6-security_update_2021-001 | |
Apple Mac OS X | =10.14.6-security_update_2021-002 | |
Apple Mac OS X | =10.14.6-security_update_2021-003 | |
Apple Mac OS X | =10.14.6-security_update_2021-004 | |
Apple Mac OS X | =10.14.6-supplemental_update | |
Apple Mac OS X | =10.14.6-supplemental_update_2 | |
Apple Mac OS X | =10.15 | |
Apple Mac OS X | =10.15.1 | |
Apple Mac OS X | =10.15.2 | |
Apple Mac OS X | =10.15.3 | |
Apple Mac OS X | =10.15.4 | |
Apple Mac OS X | =10.15.5 | |
Apple Mac OS X | =10.15.6 | |
Apple Mac OS X | =10.15.6-supplemental_update | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2020-005 | |
Apple Mac OS X | =10.15.7-security_update_2020-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-supplemental_update | |
Apple macOS | >=11.0<11.5 | |
Apple tvOS | <14.7 | |
Apple watchOS | <7.6 | |
Apple watchOS | <7.6 | 7.6 |
Apple macOS Big Sur | <11.5 | 11.5 |
Apple Catalina | ||
Apple Mojave | ||
Apple tvOS | <14.7 | 14.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30759 is a vulnerability in the FontParser component that allowed for a stack overflow, which has been addressed with improved input validation.
CVE-2021-30759 affects Apple Mojave, Apple WatchOS up to version 7.6, Apple tvOS up to version 14.7, Apple Catalina, and Apple macOS Big Sur up to version 11.5.
The severity of CVE-2021-30759 is not provided in the given information.
To fix the CVE-2021-30759 vulnerability, make sure to update your software to the latest version provided by Apple.
More information about CVE-2021-30759 can be found on the official Apple support website at the provided references.