CVE-2021-30934

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

19 Feb 2022, 04:32

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2022/dsa-5060 - (DEBIAN) https://www.debian.org/security/2022/dsa-5060 - Issue Tracking, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5061 - (DEBIAN) https://www.debian.org/security/2022/dsa-5061 - Issue Tracking, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - Issue Tracking, Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 - (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 - Issue Tracking, Mailing List, Third Party Advisory
CPE cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

06 Feb 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ -

26 Jan 2022, 11:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5060 -
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5061 -

23 Jan 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ -

21 Jan 2022, 19:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 -

27 Dec 2021, 20:51

Type Values Removed Values Added
References (MISC) https://support.apple.com/en-us/HT212978 - (MISC) https://support.apple.com/en-us/HT212978 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212976 - (MISC) https://support.apple.com/en-us/HT212976 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212980 - (MISC) https://support.apple.com/en-us/HT212980 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212975 - (MISC) https://support.apple.com/en-us/HT212975 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212982 - (MISC) https://support.apple.com/en-us/HT212982 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 9.3
v3 : 8.8
CPE cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CWE CWE-120

23 Dec 2021, 20:15

Type Values Removed Values Added
References
  • (MISC) https://support.apple.com/en-us/HT212980 -
  • (MISC) https://support.apple.com/en-us/HT212978 -
  • (MISC) https://support.apple.com/en-us/HT212975 -
  • (MISC) https://support.apple.com/en-us/HT212982 -
  • (MISC) https://support.apple.com/en-us/HT212976 -
Summary ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by the CVE program. Notes: none. A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.

24 Aug 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-24 19:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-30934

Mitre link : CVE-2021-30934

CVE.ORG link : CVE-2021-30934


JSON object : View

Products Affected

apple

  • iphone_os
  • safari
  • ipados
  • macos
  • watchos
  • tvos

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')