About the security content of tvOS 14.6
This document describes the security content of tvOS 14.6.
About Apple security updates
For our customers' protection, Apple doesn't disclose, discuss or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.
Apple security documents reference vulnerabilities by CVE-ID when possible.
For more information about security, see the Apple Product Security page.
tvOS 14.6
Audio
Available for: Apple TV 4K and Apple TV HD
Impact: processing a maliciously crafted audio file may lead to arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30707: hjy79425575 (working with Trend Micro Zero Day Initiative)
Audio
Available for: Apple TV 4K and Apple TV HD
Impact: Parsing a maliciously crafted audio file may lead to the disclosure of user information
Description: This issue was addressed with improved checks.
CVE-2021-30685: Mickey Jin (@patch1t) of Trend Micro
CoreAudio
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted audio file may disclose restricted memory
Description: An out-of-bounds read was addressed with improved bounds checking.
CVE-2021-30686: Mickey Jin of Trend Micro
CoreText
Available for: Apple TV 4K and Apple TV HD
Impact: An out-of-bounds read was addressed with improved input validation
Description: Processing a maliciously crafted font may result in the disclosure of process memory.
CVE-2021-30753: Xingwei Lin of Ant Security Light-Year Lab
CVE-2021-30733: Sunglin from the Knownsec 404
Crash Reporter
Available for: Apple TV 4K and Apple TV HD
Impact: a malicious application may be able to modify protected parts of the file system
Description: a logic issue was addressed with improved state management.
CVE-2021-30727: Cees Elzinga
CVMS
Available for: Apple TV 4K and Apple TV HD
Impact: a local attacker may be able to elevate their privileges
Description: This issue was addressed with improved checks.
CVE-2021-30724: Mickey Jin (@patch1t) of Trend Micro
FontParser
Available for: Apple TV 4K and Apple TV HD
Impact: processing a maliciously crafted font file may lead to arbitrary code execution
Description: an out-of-bounds write was addressed with improved input validation.
CVE-2021-30771: Mickey Jin (@patch1t) of Trend Micro, CFF of Topsec Alpha Team
FontParser
Available for: Apple TV 4K and Apple TV HD
Impact: An out-of-bounds read was addressed with improved input validation
Description: Processing a maliciously crafted font may result in the disclosure of process memory.
CVE-2021-30755: Xingwei Lin of Ant Security Light-Year Lab
Heimdal
Available for: Apple TV 4K and Apple TV HD
Impact: A local user may be able to leak sensitive user information
Description: A logic issue was addressed with improved state management.
CVE-2021-30697: Gabe Kirkpatrick (@gabe_k)
Heimdal
Available for: Apple TV 4K and Apple TV HD
Impact: A malicious application may cause a denial of service or potentially disclose memory contents
Description: A memory corruption issue was addressed with improved state management.
CVE-2021-30710: Gabe Kirkpatrick (@gabe_k)
ImageIO
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted image may lead to the disclosure of user information
Description: an out-of-bounds read was addressed with improved bounds checking.
CVE-2021-30687: Hou JingYi (@hjy79425575) of Qihoo 360
ImageIO
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted image may lead to the disclosure of user information
Description: This issue was addressed with improved checks.
CVE-2021-30700: Ye Zhang (@co0py_Cat) of Baidu Security
ImageIO
Available for: Apple TV 4K and Apple TV HD
Impact: processing a maliciously crafted image may lead to arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30701: Mickey Jin (@patch1t) of Trend Micro and Ye Zhang of Baidu Security
ImageIO
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted ASTC file may disclose memory contents
Description: This issue was addressed with improved checks.
CVE-2021-30705: Ye Zhang of Baidu Security
ImageIO
Available for: Apple TV 4K and Apple TV HD
Impact: This issue was addressed with improved checks
Description: Processing a maliciously crafted image may lead to disclosure of user information.
CVE-2021-30706: Anonymous (working with Trend Micro Zero Day Initiative), Jzhu (working with Trend Micro Zero Day Initiative)
Kernel
Available for: Apple TV 4K and Apple TV HD
Impact: A malicious application may be able to execute arbitrary code with kernel privileges
Description: A logic issue was addressed with improved validation.
CVE-2021-30740: Linus Henze (pinauten.de)
Kernel
Available for: Apple TV 4K and Apple TV HD
Impact: an application may be able to execute arbitrary code with kernel privileges
Description: a logic issue was addressed with improved state management.
CVE-2021-30704: An anonymous researcher
Kernel
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted message may lead to a denial of service
Description: A logic issue was addressed with improved state management.
CVE-2021-30715: The UK's National Cyber Security Centre (NCSC)
Kernel
Available for: Apple TV 4K and Apple TV HD
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A buffer overflow was addressed with improved size validation.
CVE-2021-30736: Ian Beer of Google Project Zero
Kernel
Available for: Apple TV 4K and Apple TV HD
Impact: A double free issue was addressed with improved memory management
Description: An application may be able to execute arbitrary code with kernel privileges.
CVE-2021-30703: An anonymous researcher
LaunchServices
Available for: Apple TV 4K and Apple TV HD
Impact: a malicious application may be able to break out of its sandbox
Description: This issue was addressed with improved environment sanitisation.
CVE-2021-30677: Ron Waisberg (@epsilan)
Security
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution
Description: A memory corruption issue in the ASN.1 decoder was addressed by removing the vulnerable code.
CVE-2021-30737: xerub
WebKit
Available for: Apple TV 4K and Apple TV HD
Impact: processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Description: A memory corruption issue was addressed with improved state management.
CVE-2021-30665: yangkang (@dnpushme)&zerokeeper&bianliang of 360 ATA
WebKit
Available for: Apple TV 4K and Apple TV HD
Impact: Processing maliciously crafted web content may lead to universal cross-site scripting
Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins.
CVE-2021-30744: Dan Hite of jsontop
WebKit
Available for: Apple TV 4K and Apple TV HD
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: A use after free issue was addressed with improved memory management.
CVE-2021-21779: Marcin Towalski of Cisco Talos
WebKit
Available for: Apple TV 4K and Apple TV HD
Impact: A malicious application may be able to leak sensitive user information
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30682: An anonymous researcher and 1lastBr3ath
WebKit
Available for: Apple TV 4K and Apple TV HD
Impact: Processing maliciously crafted web content may lead to universal cross-site scripting
Description: A logic issue was addressed with improved state management.
CVE-2021-30689: An anonymous researcher
WebKit
Available for: Apple TV 4K and Apple TV HD
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: Multiple memory corruption issues were addressed with improved memory handling.
CVE-2021-30749: An anonymous researcher and mipu94 of SEFCOM lab, ASU. (working with Trend Micro Zero Day Initiative)
CVE-2021-30734: Jack Dates of RET2 Systems, Inc. (@ret2systems), working with Trend Micro Zero Day Initiative
WebKit
Available for: Apple TV 4K and Apple TV HD
Impact: A malicious website may be able to access restricted ports on arbitrary servers
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30720: David Schütz (@xdavidhu)
WebKit
Available for: Apple TV 4K and Apple TV HD
Impact: processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Description: An integer overflow was addressed with improved input validation.
CVE-2021-30663: an anonymous researcher
Additional recognition
ImageIO
We would like to acknowledge Jzhu (working with Trend Micro Zero Day Initiative) and an anonymous researcher for their assistance.
WebKit
We would like to acknowledge Chris Salls (@salls) of Makai Security for their assistance.
Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.