{"id":"CVE-2021-30858","details":"A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.","modified":"2026-03-13T04:49:33.571640Z","published":"2021-08-24T19:15:14.253Z","related":["MGASA-2021-0447","MGASA-2021-0498","SUSE-SU-2021:3282-1","SUSE-SU-2021:3296-1","SUSE-SU-2021:3353-1","SUSE-SU-2022:0142-1","SUSE-SU-2022:0182-1","SUSE-SU-2022:0182-2","SUSE-SU-2022:0183-1","openSUSE-SU-2021:1369-1","openSUSE-SU-2021:3353-1","openSUSE-SU-2022:0182-1","openSUSE-SU-2024:11506-1"],"references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-30858"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2021/Sep/50"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4975"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT212807"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT212824"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4976"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2021/Sep/25"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2021/Sep/27"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2021/Sep/38"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2021/Sep/39"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2021/Sep/29"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT212804"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2021/10/26/9"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2021/10/27/1"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2021/09/20/1"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2021/10/27/2"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2021/10/27/4"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-30858.json","unresolved_ranges":[{"events":[{"introduced":"13.1"},{"fixed":"14.8"}]},{"events":[{"introduced":"0"},{"fixed":"12.5.5"}]},{"events":[{"introduced":"13.0"},{"fixed":"14.8"}]},{"events":[{"introduced":"0"},{"fixed":"11.6"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}