First published: Mon Jul 19 2021(Updated: )
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.
Credit: Sergei Glazunov Google Project ZeroSergei Glazunov Google Project ZeroSergei Glazunov Google Project ZeroSergei Glazunov Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/webkit2gtk | 2.36.4-1~deb10u1 2.38.6-0+deb10u1 2.40.5-1~deb11u1 2.42.1-1~deb11u2 2.40.5-1~deb12u1 2.42.1-1~deb12u1 2.42.1-2 | |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.42.1-1 | |
Apple Safari | <14.1.2 | |
Apple iPhone OS | <14.7 | |
Apple macOS | >=11.0<11.5 | |
Apple tvOS | <14.7 | |
Apple watchOS | <7.6 | |
Apple watchOS | <7.6 | 7.6 |
Apple macOS Big Sur | <11.5 | 11.5 |
Apple tvOS | <14.7 | 14.7 |
Apple Safari | <14.1.2 | 14.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2021-30795.
This vulnerability is a use after free issue in WebKit, which has been addressed with improved memory management.
The affected software products include Apple Safari up to version 14.1.2, macOS Big Sur up to version 11.5, watchOS up to version 7.6, and tvOS up to version 14.7.
To fix this vulnerability, make sure you update your software to the recommended versions: Apple Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, and tvOS 14.7.
Yes, you can find more information about this vulnerability and the recommended updates in the references provided by Apple.