CVE-2021-30952

An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/01/21/2 Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ Broken Link
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ Broken Link
https://support.apple.com/en-us/HT212975 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212976 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212978 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212980 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212982 Release Notes Vendor Advisory
https://www.debian.org/security/2022/dsa-5060 Mailing List Third Party Advisory
https://www.debian.org/security/2022/dsa-5061 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/01/21/2 Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ Broken Link
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ Broken Link
https://support.apple.com/en-us/HT212975 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212976 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212978 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212980 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT212982 Release Notes Vendor Advisory
https://www.debian.org/security/2022/dsa-5060 Mailing List Third Party Advisory
https://www.debian.org/security/2022/dsa-5061 Mailing List Third Party Advisory
https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit Exploit Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30952 US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*

History

06 Mar 2026, 13:44

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/01/21/2 - () http://www.openwall.com/lists/oss-security/2022/01/21/2 - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - Broken Link
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - Broken Link
References () https://support.apple.com/en-us/HT212975 - () https://support.apple.com/en-us/HT212975 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT212976 - () https://support.apple.com/en-us/HT212976 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT212978 - () https://support.apple.com/en-us/HT212978 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT212980 - () https://support.apple.com/en-us/HT212980 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT212982 - () https://support.apple.com/en-us/HT212982 - Release Notes, Vendor Advisory
References () https://www.debian.org/security/2022/dsa-5060 - () https://www.debian.org/security/2022/dsa-5060 - Mailing List, Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5061 - () https://www.debian.org/security/2022/dsa-5061 - Mailing List, Third Party Advisory
References () https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit - () https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit - Exploit, Third Party Advisory
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30952 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30952 - US Government Resource
CPE cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*
First Time Webkitgtk webkitgtk
Wpewebkit
Webkitgtk
Wpewebkit wpe Webkit

05 Mar 2026, 20:16

Type Values Removed Values Added
References
  • () https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit -
  • () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30952 -

21 Nov 2024, 06:05

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/01/21/2 - () http://www.openwall.com/lists/oss-security/2022/01/21/2 -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ -
References () https://support.apple.com/en-us/HT212975 - () https://support.apple.com/en-us/HT212975 -
References () https://support.apple.com/en-us/HT212976 - () https://support.apple.com/en-us/HT212976 -
References () https://support.apple.com/en-us/HT212978 - () https://support.apple.com/en-us/HT212978 -
References () https://support.apple.com/en-us/HT212980 - () https://support.apple.com/en-us/HT212980 -
References () https://support.apple.com/en-us/HT212982 - () https://support.apple.com/en-us/HT212982 -
References () https://www.debian.org/security/2022/dsa-5060 - () https://www.debian.org/security/2022/dsa-5060 -
References () https://www.debian.org/security/2022/dsa-5061 - () https://www.debian.org/security/2022/dsa-5061 -

07 Nov 2023, 03:34

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/', 'name': 'FEDORA-2022-25a98f5d55', 'tags': ['Issue Tracking', 'Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/', 'name': 'FEDORA-2022-f7366e60cb', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ -
References (DEBIAN) https://www.debian.org/security/2022/dsa-5060 - Issue Tracking, Third Party Advisory () https://www.debian.org/security/2022/dsa-5060 -
References (DEBIAN) https://www.debian.org/security/2022/dsa-5061 - Issue Tracking, Third Party Advisory () https://www.debian.org/security/2022/dsa-5061 -
References (MISC) https://support.apple.com/en-us/HT212976 - Vendor Advisory () https://support.apple.com/en-us/HT212976 -
References (MISC) https://support.apple.com/en-us/HT212975 - Vendor Advisory () https://support.apple.com/en-us/HT212975 -
References (MISC) https://support.apple.com/en-us/HT212980 - Vendor Advisory () https://support.apple.com/en-us/HT212980 -
References (MISC) https://support.apple.com/en-us/HT212978 - Vendor Advisory () https://support.apple.com/en-us/HT212978 -
References (MISC) https://support.apple.com/en-us/HT212982 - Vendor Advisory () https://support.apple.com/en-us/HT212982 -
References (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 - Issue Tracking, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/01/21/2 -

Information

Published : 2021-08-24 19:15

Updated : 2026-03-06 13:44


NVD link : CVE-2021-30952

Mitre link : CVE-2021-30952

CVE.ORG link : CVE-2021-30952


JSON object : View

Products Affected

apple

  • watchos
  • safari
  • iphone_os
  • tvos
  • ipados
  • macos

fedoraproject

  • fedora

webkitgtk

  • webkitgtk

wpewebkit

  • wpe_webkit

debian

  • debian_linux
CWE
CWE-190

Integer Overflow or Wraparound