First published: Tue Aug 24 2021(Updated: )
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. An application may be able to execute arbitrary code with kernel privileges.
Credit: Xinru Chi Pangu Lab cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.1 | 12.1 |
Apple macOS | <11.6.2 | 11.6.2 |
tvOS | <15.2 | 15.2 |
macOS Catalina | ||
Apple iOS, iPadOS, and watchOS | <15.2 | 15.2 |
Apple iOS, iPadOS, and watchOS | <15.2 | 15.2 |
Apple iOS, iPadOS, and watchOS | <8.3 | 8.3 |
Apple iOS, iPadOS, and watchOS | <15.2 | |
iStyle @cosme iPhone OS | <15.2 | |
Apple iOS and macOS | >=10.15<10.15.7 | |
Apple iOS and macOS | =10.15.7 | |
Apple iOS and macOS | =10.15.7-security_update_2020-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-002 | |
Apple iOS and macOS | =10.15.7-security_update_2021-003 | |
Apple iOS and macOS | =10.15.7-security_update_2021-004 | |
Apple iOS and macOS | =10.15.7-security_update_2021-005 | |
Apple iOS and macOS | =10.15.7-security_update_2021-006 | |
Apple iOS and macOS | =10.15.7-security_update_2021-007 | |
Apple iOS and macOS | =10.15.7-supplemental_update | |
Apple iOS and macOS | >=11.0<11.6.2 | |
Apple iOS and macOS | >=12.0<12.1 | |
tvOS | <15.2 | |
Apple iOS, iPadOS, and watchOS | <8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2021-30980.
The affected software includes Apple macOS Monterey 12.1, Apple macOS Big Sur 11.6.2, Apple Catalina, Apple iOS up to 15.2, Apple iPadOS up to 15.2, Apple watchOS up to 8.3, and Apple tvOS up to 15.2.
The severity of CVE-2021-30980 is not specified in the information provided.
The use after free issue was addressed with improved memory management.
To fix the vulnerability, users should update their affected software versions to the specified versions mentioned.