First published: Mon Sep 13 2021(Updated: )
A URI parsing issue was addressed with improved parsing. This issue is fixed in Security Update 2021-005 Catalina, macOS Big Sur 11.6. A local user may be able to execute arbitrary files.
Credit: Nathan Nye WhiteBeam Security Inc product-security@apple.com an anonymous researcher
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.6 | 11.6 |
macOS Catalina | ||
Apple iOS and macOS | >=10.15<=10.15.6 | |
Apple iOS and macOS | =10.15.7 | |
Apple iOS and macOS | =10.15.7-security_update_2020 | |
Apple iOS and macOS | =10.15.7-security_update_2020-001 | |
Apple iOS and macOS | =10.15.7-security_update_2020-005 | |
Apple iOS and macOS | =10.15.7-security_update_2020-007 | |
Apple iOS and macOS | =10.15.7-security_update_2021-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-002 | |
Apple iOS and macOS | =10.15.7-security_update_2021-003 | |
Apple iOS and macOS | =10.15.7-supplemental_update | |
Apple iOS and macOS | >=11.0<11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30829 is a vulnerability in CUPS that involves a URI parsing issue.
The severity level of CVE-2021-30829 has not been provided.
CVE-2021-30829 affects macOS Big Sur (version up to 11.6) and Apple Catalina.
To fix CVE-2021-30829, ensure that you have installed the latest updates provided by Apple.
You can find more information about CVE-2021-30829 on the Apple support page: https://support.apple.com/en-us/HT212804