{"containers":{"cna":{"affected":[{"product":"watchOS","vendor":"Apple","versions":[{"lessThan":"8.3","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"iOS and iPadOS","vendor":"Apple","versions":[{"lessThan":"15.2","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"12.1","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"11.6","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"15.2","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"2021","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A malicious application may be able to execute arbitrary code with kernel privileges."}],"problemTypes":[{"descriptions":[{"description":"A malicious application may be able to execute arbitrary code with kernel privileges","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-01-24T16:06:11.000Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT212975"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT212976"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT212978"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT212979"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT212981"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT212980"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/165670/XNU-Kernel-mach_msg-Use-After-Free.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"product-security@apple.com","ID":"CVE-2021-30949","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"8.3"}]}},{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_value":"15.2"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"12.1"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"11.6"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"15.2"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"2021"}]}}]},"vendor_name":"Apple"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A malicious application may be able to execute arbitrary code with kernel privileges."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"A malicious application may be able to execute arbitrary code with kernel privileges"}]}]},"references":{"reference_data":[{"name":"https://support.apple.com/en-us/HT212975","refsource":"MISC","url":"https://support.apple.com/en-us/HT212975"},{"name":"https://support.apple.com/en-us/HT212976","refsource":"MISC","url":"https://support.apple.com/en-us/HT212976"},{"name":"https://support.apple.com/en-us/HT212978","refsource":"MISC","url":"https://support.apple.com/en-us/HT212978"},{"name":"https://support.apple.com/en-us/HT212979","refsource":"MISC","url":"https://support.apple.com/en-us/HT212979"},{"name":"https://support.apple.com/en-us/HT212981","refsource":"MISC","url":"https://support.apple.com/en-us/HT212981"},{"name":"https://support.apple.com/en-us/HT212980","refsource":"MISC","url":"https://support.apple.com/en-us/HT212980"},{"name":"http://packetstormsecurity.com/files/165670/XNU-Kernel-mach_msg-Use-After-Free.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/165670/XNU-Kernel-mach_msg-Use-After-Free.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T22:48:14.253Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT212975"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT212976"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT212978"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT212979"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT212981"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT212980"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/165670/XNU-Kernel-mach_msg-Use-After-Free.html"}]}]},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2021-30949","datePublished":"2021-08-24T18:50:49.000Z","dateReserved":"2021-04-13T00:00:00.000Z","dateUpdated":"2024-08-03T22:48:14.253Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}