First published: Mon Sep 13 2021(Updated: )
A memory corruption issue was addressed with improved memory handling. This issue is fixed in Security Update 2021-005 Catalina, macOS Big Sur 11.6. A malicious application may be able to execute arbitrary code with kernel privileges.
Credit: Zweig Kunlun Lab product-security@apple.com Zweig Kunlun Lab
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Catalina | ||
Apple macOS Big Sur | <11.6 | 11.6 |
Apple Mac OS X | >=10.15<=10.15.6 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2020-005 | |
Apple Mac OS X | =10.15.7-security_update_2020-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-supplemental_update | |
Apple macOS | >=11.0<11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2021-30830.
The title of the vulnerability is 'Kernel. A memory corruption issue was addressed with improved memory handling.'
The vulnerability affects Apple macOS Big Sur version up to and including 11.6, as well as Apple Catalina.
To fix this vulnerability, ensure that your Apple macOS Big Sur is updated to version 11.6 or later.
You can find more information about this vulnerability on the following Apple support pages: [CVE-2021-30830](https://support.apple.com/en-us/HT212804) and [CVE-2021-30830](https://support.apple.com/en-us/HT212805).