CVE-2021-30952

An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

History

25 Feb 2022, 19:39

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
References (DEBIAN) https://www.debian.org/security/2022/dsa-5060 - (DEBIAN) https://www.debian.org/security/2022/dsa-5060 - Issue Tracking, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2022/dsa-5061 - (DEBIAN) https://www.debian.org/security/2022/dsa-5061 - Issue Tracking, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - Issue Tracking, Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 - (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 - Issue Tracking, Mailing List, Third Party Advisory

06 Feb 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ -

26 Jan 2022, 11:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5060 -
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5061 -

23 Jan 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ -

21 Jan 2022, 19:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 -

29 Dec 2021, 18:02

Type Values Removed Values Added
CPE cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
References (MISC) https://support.apple.com/en-us/HT212978 - (MISC) https://support.apple.com/en-us/HT212978 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212976 - (MISC) https://support.apple.com/en-us/HT212976 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212980 - (MISC) https://support.apple.com/en-us/HT212980 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212975 - (MISC) https://support.apple.com/en-us/HT212975 - Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT212982 - (MISC) https://support.apple.com/en-us/HT212982 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 7.8
CWE CWE-190

23 Dec 2021, 20:15

Type Values Removed Values Added
References
  • (MISC) https://support.apple.com/en-us/HT212980 -
  • (MISC) https://support.apple.com/en-us/HT212978 -
  • (MISC) https://support.apple.com/en-us/HT212975 -
  • (MISC) https://support.apple.com/en-us/HT212982 -
  • (MISC) https://support.apple.com/en-us/HT212976 -
Summary ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by the CVE program. Notes: none. An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.

24 Aug 2021, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-24 19:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-30952

Mitre link : CVE-2021-30952

CVE.ORG link : CVE-2021-30952


JSON object : View

Products Affected

apple

  • iphone_os
  • safari
  • ipados
  • macos
  • watchos
  • tvos

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-190

Integer Overflow or Wraparound