CVE-2021-30951

A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

History

25 Feb 2022, 19:36

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
References (DEBIAN) https://www.debian.org/security/2022/dsa-5060 - (DEBIAN) https://www.debian.org/security/2022/dsa-5060 - Issue Tracking, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5061 - (DEBIAN) https://www.debian.org/security/2022/dsa-5061 - Issue Tracking, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - Issue Tracking, Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 - (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 - Issue Tracking, Mailing List, Third Party Advisory

06 Feb 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ -

26 Jan 2022, 11:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5060 -
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5061 -

23 Jan 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ -

21 Jan 2022, 19:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 -

29 Dec 2021, 18:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.8
References (MISC) https://support.apple.com/en-us/HT212978 - (MISC) https://support.apple.com/en-us/HT212978 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212976 - (MISC) https://support.apple.com/en-us/HT212976 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212980 - (MISC) https://support.apple.com/en-us/HT212980 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212975 - (MISC) https://support.apple.com/en-us/HT212975 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212982 - (MISC) https://support.apple.com/en-us/HT212982 - Vendor Advisory
CPE cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CWE CWE-416

23 Dec 2021, 20:15

Type Values Removed Values Added
Summary ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by the CVE program. Notes: none. A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
References
  • (MISC) https://support.apple.com/en-us/HT212980 -
  • (MISC) https://support.apple.com/en-us/HT212978 -
  • (MISC) https://support.apple.com/en-us/HT212975 -
  • (MISC) https://support.apple.com/en-us/HT212982 -
  • (MISC) https://support.apple.com/en-us/HT212976 -

24 Aug 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-24 19:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-30951

Mitre link : CVE-2021-30951

CVE.ORG link : CVE-2021-30951


JSON object : View

Products Affected

apple

  • iphone_os
  • safari
  • ipados
  • macos
  • watchos
  • tvos

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-416

Use After Free