An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
06 Mar 2026, 13:44
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2022/01/21/2 - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - Broken Link | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - Broken Link | |
| References | () https://support.apple.com/en-us/HT212975 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/HT212976 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/HT212978 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/HT212980 - Release Notes, Vendor Advisory | |
| References | () https://support.apple.com/en-us/HT212982 - Release Notes, Vendor Advisory | |
| References | () https://www.debian.org/security/2022/dsa-5060 - Mailing List, Third Party Advisory | |
| References | () https://www.debian.org/security/2022/dsa-5061 - Mailing List, Third Party Advisory | |
| References | () https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit - Exploit, Third Party Advisory | |
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30952 - US Government Resource | |
| CPE | cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:* cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:* |
|
| First Time |
Webkitgtk webkitgtk
Wpewebkit Webkitgtk Wpewebkit wpe Webkit |
05 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 06:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2022/01/21/2 - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ - | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ - | |
| References | () https://support.apple.com/en-us/HT212975 - | |
| References | () https://support.apple.com/en-us/HT212976 - | |
| References | () https://support.apple.com/en-us/HT212978 - | |
| References | () https://support.apple.com/en-us/HT212980 - | |
| References | () https://support.apple.com/en-us/HT212982 - | |
| References | () https://www.debian.org/security/2022/dsa-5060 - | |
| References | () https://www.debian.org/security/2022/dsa-5061 - |
07 Nov 2023, 03:34
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://www.debian.org/security/2022/dsa-5060 - | |
| References | () https://www.debian.org/security/2022/dsa-5061 - | |
| References | () https://support.apple.com/en-us/HT212976 - | |
| References | () https://support.apple.com/en-us/HT212975 - | |
| References | () https://support.apple.com/en-us/HT212980 - | |
| References | () https://support.apple.com/en-us/HT212978 - | |
| References | () https://support.apple.com/en-us/HT212982 - | |
| References | () http://www.openwall.com/lists/oss-security/2022/01/21/2 - |
Information
Published : 2021-08-24 19:15
Updated : 2026-03-06 13:44
NVD link : CVE-2021-30952
Mitre link : CVE-2021-30952
CVE.ORG link : CVE-2021-30952
JSON object : View
Products Affected
apple
- watchos
- safari
- iphone_os
- tvos
- ipados
- macos
fedoraproject
- fedora
webkitgtk
- webkitgtk
wpewebkit
- wpe_webkit
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound
