var-202108-2172
Vulnerability from variot

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Updates are Available for iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation). ========================================================================== Ubuntu Security Notice USN-5087-1 September 22, 2021

webkit2gtk vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 21.04
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in WebKitGTK. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 21.04: libjavascriptcoregtk-4.0-18 2.32.4-0ubuntu0.21.04.1 libwebkit2gtk-4.0-37 2.32.4-0ubuntu0.21.04.1

Ubuntu 20.04 LTS: libjavascriptcoregtk-4.0-18 2.32.4-0ubuntu0.20.04.1 libwebkit2gtk-4.0-37 2.32.4-0ubuntu0.20.04.1

Ubuntu 18.04 LTS: libjavascriptcoregtk-4.0-18 2.32.4-0ubuntu0.18.04.1 libwebkit2gtk-4.0-37 2.32.4-0ubuntu0.18.04.1

This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK, such as Epiphany, to make all the necessary changes. Information about the security content is also available at https://support.apple.com/HT212804. Description: An integer overflow was addressed with improved input validation. CVE-2021-30860: The Citizen Lab

CUPS Available for: macOS Big Sur Impact: A local attacker may be able to elevate their privileges Description: A permissions issue existed. CVE-2021-30827: an anonymous researcher Entry added September 20, 2021

CUPS Available for: macOS Big Sur Impact: A local user may be able to read arbitrary files as root Description: This issue was addressed with improved checks. CVE-2021-30828: an anonymous researcher Entry added September 20, 2021

CUPS Available for: macOS Big Sur Impact: A local user may be able to execute arbitrary files Description: A URI parsing issue was addressed with improved parsing. CVE-2021-30829: an anonymous researcher Entry added September 20, 2021

curl Available for: macOS Big Sur Impact: curl could potentially reveal sensitive internal information to the server using a clear-text network protocol Description: A buffer overflow was addressed with improved input validation. CVE-2021-22925 Entry added September 20, 2021

CVMS Available for: macOS Big Sur Impact: A local attacker may be able to elevate their privileges Description: A memory corruption issue was addressed with improved state management. CVE-2021-30832: Mickey Jin (@patch1t) of Trend Micro Entry added September 20, 2021

FontParser Available for: macOS Big Sur Impact: Processing a maliciously crafted dfont file may lead to arbitrary code execution Description: This issue was addressed with improved checks. CVE-2021-30841: Xingwei Lin of Ant Security Light-Year Lab CVE-2021-30842: Xingwei Lin of Ant Security Light-Year Lab CVE-2021-30843: Xingwei Lin of Ant Security Light-Year Lab Entry added September 20, 2021

Gatekeeper Available for: macOS Big Sur Impact: A malicious application may bypass Gatekeeper checks Description: This issue was addressed with improved checks. CVE-2021-30853: Gordon Long (@ethicalhax) of Box, Inc. CVE-2021-30847: Mike Zhang of Pangu Lab Entry added September 20, 2021

Kernel Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2021-30830: Zweig of Kunlun Lab Entry added September 20, 2021

Kernel Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds read was addressed with improved input validation. CVE-2021-30865: Zweig of Kunlun Lab Entry added September 20, 2021

Kernel Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with improved locking. CVE-2021-30857: Zweig of Kunlun Lab Entry added September 20, 2021

Kernel Available for: macOS Big Sur Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A type confusion issue was addressed with improved state handling. CVE-2021-30859: Apple Entry added September 20, 2021

libexpat Available for: macOS Big Sur Impact: A remote attacker may be able to cause a denial of service Description: This issue was addressed by updating expat to version 2.4.1. CVE-2013-0340: an anonymous researcher Entry added September 20, 2021

Preferences Available for: macOS Big Sur Impact: An application may be able to access restricted files Description: A validation issue existed in the handling of symlinks. CVE-2021-30855: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com) Entry added September 20, 2021

Sandbox Available for: macOS Big Sur Impact: A user may gain access to protected parts of the file system Description: An access issue was addressed with improved access restrictions. CVE-2021-30850: an anonymous researcher Entry added September 20, 2021

SMB Available for: macOS Big Sur Impact: A local user may be able to read kernel memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2021-30845: Peter Nguyen Vu Hoang of STAR Labs Entry added September 20, 2021

SMB Available for: macOS Big Sur Impact: A remote attacker may be able to leak memory Description: A logic issue was addressed with improved state management. CVE-2021-30858: an anonymous researcher

Additional recognition

APFS We would like to acknowledge Koh M. Nakagawa of FFRI Security, Inc. for their assistance. Entry added September 20, 2021

App Support We would like to acknowledge @CodeColorist, an anonymous researcher for their assistance. Entry added September 20, 2021

CoreML We would like to acknowledge hjy79425575 working with Trend Micro Zero Day Initiative for their assistance. Entry added September 20, 2021

CUPS We would like to acknowledge an anonymous researcher for their assistance. Entry added September 20, 2021

Kernel We would like to acknowledge Anthony Steinhauser of Google's Safeside project for their assistance. Entry added September 20, 2021

Sandbox We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive Security for their assistance. Entry added September 20, 2021

smbx We would like to acknowledge Zhongcheng Li (CK01) for their assistance. Entry added September 20, 2021

Installation note:

This update may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/

Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEePiLW1MrMjw19XzoeC9qKD1prhgFAmFI888ACgkQeC9qKD1p rhi/Bg/9GiqXl8sxPjDpATJqneZ1GcAxWxBZgkFrcLV/cMwrVqniWsOeVHqHjMSY eJUkGehUtKsYE0g8Uk0qJqOUl3dxxGJpIDytOQJB3TFdd1BpZSK/tOChVem1JV1B +CMhqDnmR/u7bLqfCr1p6J5QJNHjTjgBA4RthdzZZ52pLGql7/2qfaJwpeHkheS4 5EKmch8zh0CGRqrUTg1HgY67ierNsz47jIU6n7UeMwjskRU3xM9VqJ9s4eKGAtSv 4Ry16pv0xUZ4cmL5EiLm2/eFbY8ByCji7jYPP0POBO4l518TGpaX2PaZBP9v0rrD t6cPEZHnsRaZ49OYak6z9iA8teKGSs6aCMuzSxExvlT8+YySf1o1nefbRH/tZMfn bwSO0ZyPsS9WYyuG/zX08U3CKOTkjqhLaOwVwte+cAeg2QS85aa9XPMG6PKcpyfu R7auxS92+Dg+R+97dAsI9TprSutCTw4iY8lyK9MVJSnh+zQSZEihUh4EaSufTHRC NlOSHvsTfXqsHaeed6sVKyX4ADHCUvRbCCIrqJKUs6waNd2T2XF7SzvgTSDJMHU9 4AL/jpnltTjDJTtMO999VZKNzYurrGiHvBs5zHWr91+eaHW8YGdsDERsX3BFYLe3 85i+Yge0iXlP7mT32cWxIw4AWDFITFiHnmV1/cdsCd2GIkqkhFw= =9bjT -----END PGP SIGNATURE-----

. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: webkit2gtk3 security and bug fix update Advisory ID: RHSA-2021:4097-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:4097 Issue date: 2021-11-02 CVE Names: CVE-2021-30858 =====================================================================

  1. Summary:

An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

  1. Description:

WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

  • webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • WebProcess::initializeWebProcess crashing on aarch64 (BZ#2010825)

  • Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source: webkit2gtk3-2.30.4-3.el8_4.src.rpm

aarch64: webkit2gtk3-2.30.4-3.el8_4.aarch64.rpm webkit2gtk3-debuginfo-2.30.4-3.el8_4.aarch64.rpm webkit2gtk3-debugsource-2.30.4-3.el8_4.aarch64.rpm webkit2gtk3-devel-2.30.4-3.el8_4.aarch64.rpm webkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.aarch64.rpm webkit2gtk3-jsc-2.30.4-3.el8_4.aarch64.rpm webkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.aarch64.rpm webkit2gtk3-jsc-devel-2.30.4-3.el8_4.aarch64.rpm webkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.aarch64.rpm

ppc64le: webkit2gtk3-2.30.4-3.el8_4.ppc64le.rpm webkit2gtk3-debuginfo-2.30.4-3.el8_4.ppc64le.rpm webkit2gtk3-debugsource-2.30.4-3.el8_4.ppc64le.rpm webkit2gtk3-devel-2.30.4-3.el8_4.ppc64le.rpm webkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.ppc64le.rpm webkit2gtk3-jsc-2.30.4-3.el8_4.ppc64le.rpm webkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.ppc64le.rpm webkit2gtk3-jsc-devel-2.30.4-3.el8_4.ppc64le.rpm webkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.ppc64le.rpm

s390x: webkit2gtk3-2.30.4-3.el8_4.s390x.rpm webkit2gtk3-debuginfo-2.30.4-3.el8_4.s390x.rpm webkit2gtk3-debugsource-2.30.4-3.el8_4.s390x.rpm webkit2gtk3-devel-2.30.4-3.el8_4.s390x.rpm webkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.s390x.rpm webkit2gtk3-jsc-2.30.4-3.el8_4.s390x.rpm webkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.s390x.rpm webkit2gtk3-jsc-devel-2.30.4-3.el8_4.s390x.rpm webkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.s390x.rpm

x86_64: webkit2gtk3-2.30.4-3.el8_4.i686.rpm webkit2gtk3-2.30.4-3.el8_4.x86_64.rpm webkit2gtk3-debuginfo-2.30.4-3.el8_4.i686.rpm webkit2gtk3-debuginfo-2.30.4-3.el8_4.x86_64.rpm webkit2gtk3-debugsource-2.30.4-3.el8_4.i686.rpm webkit2gtk3-debugsource-2.30.4-3.el8_4.x86_64.rpm webkit2gtk3-devel-2.30.4-3.el8_4.i686.rpm webkit2gtk3-devel-2.30.4-3.el8_4.x86_64.rpm webkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.i686.rpm webkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.x86_64.rpm webkit2gtk3-jsc-2.30.4-3.el8_4.i686.rpm webkit2gtk3-jsc-2.30.4-3.el8_4.x86_64.rpm webkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.i686.rpm webkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.x86_64.rpm webkit2gtk3-jsc-devel-2.30.4-3.el8_4.i686.rpm webkit2gtk3-jsc-devel-2.30.4-3.el8_4.x86_64.rpm webkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.i686.rpm webkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2021-30858 https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYYEkR9zjgjWX9erEAQgSYRAAqB1YabSEnLYejpScbdUufAFEeQ6fdnkL 0Z2C1nfc3Zc1/Z9Sr/LOhxQm/iijm/4GIgwwzY7j5Ccu1KTjSev7i77VEqVr7DNC 3Dp+KBFVDxP4ArUNXyhpvYcLqaVLjKRAWchqoCmWg3FKQK1Qml7+OkmLdrhkkBw2 2LW7+QHBeXykXAZPr0HLdAQv7Z4qsP+cN83ccul3Ds9iL8ERNBg4uaf8t+Fad5BT 5N7vdQ9HFaFk7DFVdyMuNCBKNT1me9siUX+WZqDK44m+97c0+SPN2JtG31KDZ39+ lOrHI4pbImH89DfhI7b7PzJW/mZyJ8FYL9zxzOdqFdqrAsuwRbj2f7KU9/oKGcbw Yi/z/TIzOUqRsHm5FI/Ug7RBUoMFxZpEc2En+jsjUQFTb42S/QaqNUwl2DpHGwiy Q+/wAsHhNUqLoIbOYHMrESUTxD6pAhKv/4fBMzjyCgdZaGsM8RQ1ZGnM4qAObj4R Q+3rTE9KdYt3W6gh2XE+TIh4ezG2O94jEjQ2fGd8WTHAOpni+sVMozNpTsL/nCBq HbDHDztCFsLCK2nK6hkiClL+a7VskzejzgbU/uhNxU7GKJT3wpqcD+uNY3bh/Y3y mLuhmwZIZpSPGW+yllWOhjjrsoeYjdqlUiQVSYYw/J8BITjni1hGHsJgp2YGdZzg TIjMx+ZhZQs= =PR28 -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce .

For the stable distribution (bullseye), this problem has been fixed in version 2.32.4-1~deb11u1.

We recommend that you upgrade your wpewebkit packages

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2172",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "34"
      },
      {
        "model": "ipados",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "14.8"
      },
      {
        "model": "iphone os",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "13.0"
      },
      {
        "model": "ipados",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "apple",
        "version": "13.1"
      },
      {
        "model": "iphone os",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "12.5.5"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "11.0"
      },
      {
        "model": "macos",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "11.6"
      },
      {
        "model": "iphone os",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "14.8"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "33"
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-30858"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "164246"
      },
      {
        "db": "PACKETSTORM",
        "id": "164201"
      },
      {
        "db": "PACKETSTORM",
        "id": "164196"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2021-30858",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2021-30858",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-390591",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2021-30858",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-30858",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202108-1951",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-390591",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-30858",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-390591"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-30858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-30858"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Updates are Available for iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation). ==========================================================================\nUbuntu Security Notice USN-5087-1\nSeptember 22, 2021\n\nwebkit2gtk vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.04\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in WebKitGTK. If a user were tricked into viewing a malicious\nwebsite, a remote attacker could exploit a variety of issues related to web\nbrowser security, including cross-site scripting attacks, denial of service\nattacks, and arbitrary code execution. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.04:\n  libjavascriptcoregtk-4.0-18     2.32.4-0ubuntu0.21.04.1\n  libwebkit2gtk-4.0-37            2.32.4-0ubuntu0.21.04.1\n\nUbuntu 20.04 LTS:\n  libjavascriptcoregtk-4.0-18     2.32.4-0ubuntu0.20.04.1\n  libwebkit2gtk-4.0-37            2.32.4-0ubuntu0.20.04.1\n\nUbuntu 18.04 LTS:\n  libjavascriptcoregtk-4.0-18     2.32.4-0ubuntu0.18.04.1\n  libwebkit2gtk-4.0-37            2.32.4-0ubuntu0.18.04.1\n\nThis update uses a new upstream release, which includes additional bug\nfixes. After a standard system update you need to restart any applications\nthat use WebKitGTK, such as Epiphany, to make all the necessary changes. \nInformation about the security content is also available at\nhttps://support.apple.com/HT212804. \nDescription: An integer overflow was addressed with improved input\nvalidation. \nCVE-2021-30860: The Citizen Lab\n\nCUPS\nAvailable for: macOS Big Sur\nImpact: A local attacker may be able to elevate their privileges\nDescription: A permissions issue existed. \nCVE-2021-30827: an anonymous researcher\nEntry added September 20, 2021\n\nCUPS\nAvailable for: macOS Big Sur\nImpact: A local user may be able to read arbitrary files as root\nDescription: This issue was addressed with improved checks. \nCVE-2021-30828: an anonymous researcher\nEntry added September 20, 2021\n\nCUPS\nAvailable for: macOS Big Sur\nImpact: A local user may be able to execute arbitrary files\nDescription: A URI parsing issue was addressed with improved parsing. \nCVE-2021-30829: an anonymous researcher\nEntry added September 20, 2021\n\ncurl\nAvailable for: macOS Big Sur\nImpact: curl could potentially reveal sensitive internal information\nto the server using a clear-text network protocol\nDescription: A buffer overflow was addressed with improved input\nvalidation. \nCVE-2021-22925\nEntry added September 20, 2021\n\nCVMS\nAvailable for: macOS Big Sur\nImpact: A local attacker may be able to elevate their privileges\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2021-30832: Mickey Jin (@patch1t) of Trend Micro\nEntry added September 20, 2021\n\nFontParser\nAvailable for: macOS Big Sur\nImpact: Processing a maliciously crafted dfont file may lead to\narbitrary code execution\nDescription: This issue was addressed with improved checks. \nCVE-2021-30841: Xingwei Lin of Ant Security Light-Year Lab\nCVE-2021-30842: Xingwei Lin of Ant Security Light-Year Lab\nCVE-2021-30843: Xingwei Lin of Ant Security Light-Year Lab\nEntry added September 20, 2021\n\nGatekeeper\nAvailable for: macOS Big Sur\nImpact: A malicious application may bypass Gatekeeper checks\nDescription: This issue was addressed with improved checks. \nCVE-2021-30853: Gordon Long (@ethicalhax) of Box, Inc. \nCVE-2021-30847: Mike Zhang of Pangu Lab\nEntry added September 20, 2021\n\nKernel\nAvailable for: macOS Big Sur\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2021-30830: Zweig of Kunlun Lab\nEntry added September 20, 2021\n\nKernel\nAvailable for: macOS Big Sur\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2021-30865: Zweig of Kunlun Lab\nEntry added September 20, 2021\n\nKernel\nAvailable for: macOS Big Sur\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A race condition was addressed with improved locking. \nCVE-2021-30857: Zweig of Kunlun Lab\nEntry added September 20, 2021\n\nKernel\nAvailable for: macOS Big Sur\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A type confusion issue was addressed with improved state\nhandling. \nCVE-2021-30859: Apple\nEntry added September 20, 2021\n\nlibexpat\nAvailable for: macOS Big Sur\nImpact: A remote attacker may be able to cause a denial of service\nDescription: This issue was addressed by updating expat to version\n2.4.1. \nCVE-2013-0340: an anonymous researcher\nEntry added September 20, 2021\n\nPreferences\nAvailable for: macOS Big Sur\nImpact: An application may be able to access restricted files\nDescription: A validation issue existed in the handling of symlinks. \nCVE-2021-30855: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020)\nof Tencent Security Xuanwu Lab (xlab.tencent.com)\nEntry added September 20, 2021\n\nSandbox\nAvailable for: macOS Big Sur\nImpact: A user may gain access to protected parts of the file system\nDescription: An access issue was addressed with improved access\nrestrictions. \nCVE-2021-30850: an anonymous researcher\nEntry added September 20, 2021\n\nSMB\nAvailable for: macOS Big Sur\nImpact: A local user may be able to read kernel memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2021-30845: Peter Nguyen Vu Hoang of STAR Labs\nEntry added September 20, 2021\n\nSMB\nAvailable for: macOS Big Sur\nImpact: A remote attacker may be able to leak memory\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2021-30858: an anonymous researcher\n\nAdditional recognition\n\nAPFS\nWe would like to acknowledge Koh M. Nakagawa of FFRI Security, Inc. \nfor their assistance. \nEntry added September 20, 2021\n\nApp Support\nWe would like to acknowledge @CodeColorist, an anonymous researcher\nfor their assistance. \nEntry added September 20, 2021\n\nCoreML\nWe would like to acknowledge hjy79425575 working with Trend Micro\nZero Day Initiative for their assistance. \nEntry added September 20, 2021\n\nCUPS\nWe would like to acknowledge an anonymous researcher for their\nassistance. \nEntry added September 20, 2021\n\nKernel\nWe would like to acknowledge Anthony Steinhauser of Google\u0027s Safeside\nproject for their assistance. \nEntry added September 20, 2021\n\nSandbox\nWe would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive\nSecurity for their assistance. \nEntry added September 20, 2021\n\nsmbx\nWe would like to acknowledge Zhongcheng Li (CK01) for their\nassistance. \nEntry added September 20, 2021\n\nInstallation note:\n\nThis update may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\n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\n85i+Yge0iXlP7mT32cWxIw4AWDFITFiHnmV1/cdsCd2GIkqkhFw=\n=9bjT\n-----END PGP SIGNATURE-----\n\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: webkit2gtk3 security and bug fix update\nAdvisory ID:       RHSA-2021:4097-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:4097\nIssue date:        2021-11-02\nCVE Names:         CVE-2021-30858 \n=====================================================================\n\n1. Summary:\n\nAn update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. Description:\n\nWebKitGTK is the port of the portable web rendering engine WebKit to the\nGTK platform. \n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution\n(CVE-2021-30858)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* WebProcess::initializeWebProcess crashing on aarch64 (BZ#2010825)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux AppStream (v. 8):\n\nSource:\nwebkit2gtk3-2.30.4-3.el8_4.src.rpm\n\naarch64:\nwebkit2gtk3-2.30.4-3.el8_4.aarch64.rpm\nwebkit2gtk3-debuginfo-2.30.4-3.el8_4.aarch64.rpm\nwebkit2gtk3-debugsource-2.30.4-3.el8_4.aarch64.rpm\nwebkit2gtk3-devel-2.30.4-3.el8_4.aarch64.rpm\nwebkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.aarch64.rpm\nwebkit2gtk3-jsc-2.30.4-3.el8_4.aarch64.rpm\nwebkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.aarch64.rpm\nwebkit2gtk3-jsc-devel-2.30.4-3.el8_4.aarch64.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.aarch64.rpm\n\nppc64le:\nwebkit2gtk3-2.30.4-3.el8_4.ppc64le.rpm\nwebkit2gtk3-debuginfo-2.30.4-3.el8_4.ppc64le.rpm\nwebkit2gtk3-debugsource-2.30.4-3.el8_4.ppc64le.rpm\nwebkit2gtk3-devel-2.30.4-3.el8_4.ppc64le.rpm\nwebkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.ppc64le.rpm\nwebkit2gtk3-jsc-2.30.4-3.el8_4.ppc64le.rpm\nwebkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.ppc64le.rpm\nwebkit2gtk3-jsc-devel-2.30.4-3.el8_4.ppc64le.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.ppc64le.rpm\n\ns390x:\nwebkit2gtk3-2.30.4-3.el8_4.s390x.rpm\nwebkit2gtk3-debuginfo-2.30.4-3.el8_4.s390x.rpm\nwebkit2gtk3-debugsource-2.30.4-3.el8_4.s390x.rpm\nwebkit2gtk3-devel-2.30.4-3.el8_4.s390x.rpm\nwebkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.s390x.rpm\nwebkit2gtk3-jsc-2.30.4-3.el8_4.s390x.rpm\nwebkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.s390x.rpm\nwebkit2gtk3-jsc-devel-2.30.4-3.el8_4.s390x.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.s390x.rpm\n\nx86_64:\nwebkit2gtk3-2.30.4-3.el8_4.i686.rpm\nwebkit2gtk3-2.30.4-3.el8_4.x86_64.rpm\nwebkit2gtk3-debuginfo-2.30.4-3.el8_4.i686.rpm\nwebkit2gtk3-debuginfo-2.30.4-3.el8_4.x86_64.rpm\nwebkit2gtk3-debugsource-2.30.4-3.el8_4.i686.rpm\nwebkit2gtk3-debugsource-2.30.4-3.el8_4.x86_64.rpm\nwebkit2gtk3-devel-2.30.4-3.el8_4.i686.rpm\nwebkit2gtk3-devel-2.30.4-3.el8_4.x86_64.rpm\nwebkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.i686.rpm\nwebkit2gtk3-devel-debuginfo-2.30.4-3.el8_4.x86_64.rpm\nwebkit2gtk3-jsc-2.30.4-3.el8_4.i686.rpm\nwebkit2gtk3-jsc-2.30.4-3.el8_4.x86_64.rpm\nwebkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.i686.rpm\nwebkit2gtk3-jsc-debuginfo-2.30.4-3.el8_4.x86_64.rpm\nwebkit2gtk3-jsc-devel-2.30.4-3.el8_4.i686.rpm\nwebkit2gtk3-jsc-devel-2.30.4-3.el8_4.x86_64.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.i686.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.30.4-3.el8_4.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-30858\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nTIjMx+ZhZQs=\n=PR28\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nFor the stable distribution (bullseye), this problem has been fixed in\nversion 2.32.4-1~deb11u1. \n\nWe recommend that you upgrade your wpewebkit packages",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-30858"
      },
      {
        "db": "VULHUB",
        "id": "VHN-390591"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-30858"
      },
      {
        "db": "PACKETSTORM",
        "id": "164262"
      },
      {
        "db": "PACKETSTORM",
        "id": "164246"
      },
      {
        "db": "PACKETSTORM",
        "id": "164201"
      },
      {
        "db": "PACKETSTORM",
        "id": "164196"
      },
      {
        "db": "PACKETSTORM",
        "id": "164982"
      },
      {
        "db": "PACKETSTORM",
        "id": "164748"
      },
      {
        "db": "PACKETSTORM",
        "id": "165524"
      },
      {
        "db": "PACKETSTORM",
        "id": "169117"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-30858",
        "trust": 2.6
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/09/20/1",
        "trust": 1.8
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/10/27/4",
        "trust": 1.8
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/10/27/2",
        "trust": 1.8
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/10/26/9",
        "trust": 1.8
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/10/27/1",
        "trust": 1.8
      },
      {
        "db": "PACKETSTORM",
        "id": "165524",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "164982",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "164748",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "164262",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "164201",
        "trust": 0.7
      },
      {
        "db": "CS-HELP",
        "id": "SB2021092018",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022011153",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021111716",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021092803",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022011401",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021091322",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021092317",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021110314",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021100415",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164242",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "164277",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3103",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3333",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3161",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3400",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3654",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3212",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0100",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3914",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3198",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0382",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202108-1951",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "165517",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-390591",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-30858",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "164246",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "164196",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "169117",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-390591"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-30858"
      },
      {
        "db": "PACKETSTORM",
        "id": "164262"
      },
      {
        "db": "PACKETSTORM",
        "id": "164246"
      },
      {
        "db": "PACKETSTORM",
        "id": "164201"
      },
      {
        "db": "PACKETSTORM",
        "id": "164196"
      },
      {
        "db": "PACKETSTORM",
        "id": "164982"
      },
      {
        "db": "PACKETSTORM",
        "id": "164748"
      },
      {
        "db": "PACKETSTORM",
        "id": "165524"
      },
      {
        "db": "PACKETSTORM",
        "id": "169117"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-30858"
      }
    ]
  },
  "id": "VAR-202108-2172",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-390591"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-09-19T19:45:21.235000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Apple macOS Big Sur Remediation of resource management error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=162838"
      },
      {
        "title": "Debian Security Advisories: DSA-4975-1 webkit2gtk -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5db54186925e9bf1d208a2b11e299b67"
      },
      {
        "title": "Debian Security Advisories: DSA-4976-1 wpewebkit -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5da73458bc4c1bfc6b9037e64c70793c"
      },
      {
        "title": "Red Hat: CVE-2021-30858",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-30858"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2022-1747",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2022-1747"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-30858 log"
      },
      {
        "title": "Amazon Linux 2022: ALAS2022-2022-015",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=ALAS2022-2022-015"
      },
      {
        "title": "CVE-202130858 (Intended for testing on an Apple iOS device or a Sony Playstation 4 of any flavor)",
        "trust": 0.1,
        "url": "https://github.com/FitTerminator/CVE-202130858 "
      },
      {
        "title": "CVEREV3",
        "trust": 0.1,
        "url": "https://github.com/KameleonReloaded/CVEREV3 "
      },
      {
        "title": "CVE-202130858 (Intended for testing on an Apple iOS device or a Sony Playstation 4 of any flavor)",
        "trust": 0.1,
        "url": "https://github.com/FitTerminator/PS4-CVE-202130858 "
      },
      {
        "title": "PS4CVE202130858",
        "trust": 0.1,
        "url": "https://github.com/Nazky/PS4CVE202130858 "
      },
      {
        "title": "https://github.com/ChendoChap/PS5-Webkit-Execution",
        "trust": 0.1,
        "url": "https://github.com/ChendoChap/PS5-Webkit-Execution "
      },
      {
        "title": "NIST Bulk CVE Lookup by Jay Chen\nSample output",
        "trust": 0.1,
        "url": "https://github.com/jaychen2/NIST-BULK-CVE-Lookup "
      },
      {
        "title": "Known Exploited Vulnerabilities Detector",
        "trust": 0.1,
        "url": "https://github.com/Ostorlab/KEV "
      },
      {
        "title": "Threatpost",
        "trust": 0.1,
        "url": "https://threatpost.com/apple-patches-zero-days-attack/174988/"
      },
      {
        "title": "The Register",
        "trust": 0.1,
        "url": "https://www.theregister.co.uk/2021/09/13/apple_ios_macos_security_fixes/"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-30858"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-416",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-390591"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-30858"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "https://support.apple.com/en-us/ht212804"
      },
      {
        "trust": 1.9,
        "url": "https://www.debian.org/security/2021/dsa-4975"
      },
      {
        "trust": 1.9,
        "url": "https://support.apple.com/en-us/ht212807"
      },
      {
        "trust": 1.8,
        "url": "https://support.apple.com/kb/ht212824"
      },
      {
        "trust": 1.8,
        "url": "https://www.debian.org/security/2021/dsa-4976"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2021/sep/25"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2021/sep/27"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2021/sep/29"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2021/sep/38"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2021/sep/39"
      },
      {
        "trust": 1.8,
        "url": "http://seclists.org/fulldisclosure/2021/sep/50"
      },
      {
        "trust": 1.8,
        "url": "http://www.openwall.com/lists/oss-security/2021/09/20/1"
      },
      {
        "trust": 1.8,
        "url": "http://www.openwall.com/lists/oss-security/2021/10/26/9"
      },
      {
        "trust": 1.8,
        "url": "http://www.openwall.com/lists/oss-security/2021/10/27/1"
      },
      {
        "trust": 1.8,
        "url": "http://www.openwall.com/lists/oss-security/2021/10/27/2"
      },
      {
        "trust": 1.8,
        "url": "http://www.openwall.com/lists/oss-security/2021/10/27/4"
      },
      {
        "trust": 1.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/bo6dmthzr57jdboxpsnr2mkdmcrwv265/"
      },
      {
        "trust": 1.1,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/xynv7ask4lqvaumjxnxbs3z7rvdq2n3w/"
      },
      {
        "trust": 0.9,
        "url": "https://access.redhat.com/security/cve/cve-2021-30858"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30858"
      },
      {
        "trust": 0.7,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/bo6dmthzr57jdboxpsnr2mkdmcrwv265/"
      },
      {
        "trust": 0.7,
        "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/xynv7ask4lqvaumjxnxbs3z7rvdq2n3w/"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0100"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0382"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021111716"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021091322"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/webkitgtk-wpe-webkit-multiple-vulnerabilities-36750"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022011401"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3198"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3654"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/apple-macos-two-vulnerabilities-36384"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021092803"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3212"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3333"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164242/apple-security-advisory-2021-09-20-6.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164262/ubuntu-security-notice-usn-5087-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164277/apple-security-advisory-2021-09-23-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164982/red-hat-security-advisory-2021-4686-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3914"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164201/apple-security-advisory-2021-09-13-5.html"
      },
      {
        "trust": 0.6,
        "url": "https://support.apple.com/en-us/ht212824"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021110314"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021092317"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021092018"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021100415"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3103"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3400"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164748/red-hat-security-advisory-2021-4097-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022011153"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/165524/red-hat-security-advisory-2022-0075-03.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3161"
      },
      {
        "trust": 0.3,
        "url": "https://support.apple.com/kb/ht201222"
      },
      {
        "trust": 0.3,
        "url": "https://www.apple.com/support/security/pgp/"
      },
      {
        "trust": 0.3,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.2,
        "url": "https://support.apple.com/ht212804."
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30860"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/416.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/fitterminator/cve-202130858"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://alas.aws.amazon.com/al2/alas-2022-1747.html"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-5087-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.4-0ubuntu0.18.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.4-0ubuntu0.21.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/webkit2gtk/2.32.4-0ubuntu0.20.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22925"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30830"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30832"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30828"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0340"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30841"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30855"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30843"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30844"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/downloads/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30859"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30829"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30853"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30857"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30845"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30850"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30865"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30847"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30842"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30827"
      },
      {
        "trust": 0.1,
        "url": "https://support.apple.com/ht212808."
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:4686"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:4097"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:0075"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://security-tracker.debian.org/tracker/wpewebkit"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-390591"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-30858"
      },
      {
        "db": "PACKETSTORM",
        "id": "164262"
      },
      {
        "db": "PACKETSTORM",
        "id": "164246"
      },
      {
        "db": "PACKETSTORM",
        "id": "164201"
      },
      {
        "db": "PACKETSTORM",
        "id": "164196"
      },
      {
        "db": "PACKETSTORM",
        "id": "164982"
      },
      {
        "db": "PACKETSTORM",
        "id": "164748"
      },
      {
        "db": "PACKETSTORM",
        "id": "165524"
      },
      {
        "db": "PACKETSTORM",
        "id": "169117"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-30858"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-390591"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-30858"
      },
      {
        "db": "PACKETSTORM",
        "id": "164262"
      },
      {
        "db": "PACKETSTORM",
        "id": "164246"
      },
      {
        "db": "PACKETSTORM",
        "id": "164201"
      },
      {
        "db": "PACKETSTORM",
        "id": "164196"
      },
      {
        "db": "PACKETSTORM",
        "id": "164982"
      },
      {
        "db": "PACKETSTORM",
        "id": "164748"
      },
      {
        "db": "PACKETSTORM",
        "id": "165524"
      },
      {
        "db": "PACKETSTORM",
        "id": "169117"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-30858"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-08-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-390591"
      },
      {
        "date": "2021-08-24T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-30858"
      },
      {
        "date": "2021-09-23T15:31:26",
        "db": "PACKETSTORM",
        "id": "164262"
      },
      {
        "date": "2021-09-22T16:33:18",
        "db": "PACKETSTORM",
        "id": "164246"
      },
      {
        "date": "2021-09-20T16:03:26",
        "db": "PACKETSTORM",
        "id": "164201"
      },
      {
        "date": "2021-09-19T14:22:22",
        "db": "PACKETSTORM",
        "id": "164196"
      },
      {
        "date": "2021-11-16T15:35:40",
        "db": "PACKETSTORM",
        "id": "164982"
      },
      {
        "date": "2021-11-02T15:42:50",
        "db": "PACKETSTORM",
        "id": "164748"
      },
      {
        "date": "2022-01-12T15:38:19",
        "db": "PACKETSTORM",
        "id": "165524"
      },
      {
        "date": "2021-09-28T19:12:00",
        "db": "PACKETSTORM",
        "id": "169117"
      },
      {
        "date": "2021-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      },
      {
        "date": "2021-08-24T19:15:14.253000",
        "db": "NVD",
        "id": "CVE-2021-30858"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-12-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-390591"
      },
      {
        "date": "2023-11-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-30858"
      },
      {
        "date": "2022-01-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      },
      {
        "date": "2024-07-29T18:30:12.843000",
        "db": "NVD",
        "id": "CVE-2021-30858"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "164262"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple macOS Big Sur Resource Management Error Vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202108-1951"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.