First published: Tue Aug 24 2021(Updated: )
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.6, Security Update 2021-005 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges.
Credit: Zweig Kunlun Lab cve@mitre.org Zweig Kunlun Lab
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Catalina | ||
Apple macOS Big Sur | <11.6 | 11.6 |
Apple Mac OS X | <10.15.7 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-security_update_2021-004 | |
Apple Mac OS X | =10.15.7-supplemental_update | |
Apple macOS | >=11.0<11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-30865 is a vulnerability in the Kernel that allows an out-of-bounds read due to improved input validation.
The affected software includes macOS Big Sur versions up to and exclusive of 11.6, and Apple Catalina.
The severity of CVE-2021-30865 is not specified.
To fix CVE-2021-30865, update to the latest version of macOS Big Sur or Apple Catalina as soon as it becomes available.
You can find more information about CVE-2021-30865 on the Apple support page: [https://support.apple.com/en-us/HT212804](https://support.apple.com/en-us/HT212804) and [https://support.apple.com/en-us/HT212805](https://support.apple.com/en-us/HT212805).