CVE-2021-30951

A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

History

07 Nov 2023, 03:34

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/', 'name': 'FEDORA-2022-25a98f5d55', 'tags': ['Issue Tracking', 'Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/', 'name': 'FEDORA-2022-f7366e60cb', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ -
References (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 - Issue Tracking, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/01/21/2 -
References (MISC) https://support.apple.com/en-us/HT212980 - Vendor Advisory () https://support.apple.com/en-us/HT212980 -
References (MISC) https://support.apple.com/en-us/HT212975 - Vendor Advisory () https://support.apple.com/en-us/HT212975 -
References (DEBIAN) https://www.debian.org/security/2022/dsa-5060 - Issue Tracking, Third Party Advisory () https://www.debian.org/security/2022/dsa-5060 -
References (MISC) https://support.apple.com/en-us/HT212978 - Vendor Advisory () https://support.apple.com/en-us/HT212978 -
References (MISC) https://support.apple.com/en-us/HT212976 - Vendor Advisory () https://support.apple.com/en-us/HT212976 -
References (MISC) https://support.apple.com/en-us/HT212982 - Vendor Advisory () https://support.apple.com/en-us/HT212982 -
References (DEBIAN) https://www.debian.org/security/2022/dsa-5061 - Issue Tracking, Third Party Advisory () https://www.debian.org/security/2022/dsa-5061 -

Information

Published : 2021-08-24 19:15

Updated : 2024-02-28 18:28


NVD link : CVE-2021-30951

Mitre link : CVE-2021-30951

CVE.ORG link : CVE-2021-30951


JSON object : View

Products Affected

apple

  • safari
  • tvos
  • macos
  • watchos
  • ipados
  • iphone_os

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-416

Use After Free