CVE-2022-42801

A logic issue was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1. An app may be able to execute arbitrary code with kernel privileges.
References
Link Resource
http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html Third Party Advisory VDB Entry
https://support.apple.com/en-us/HT213488 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213489 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213490 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213491 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213492 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213494 Release Notes Vendor Advisory
http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html Third Party Advisory VDB Entry
https://support.apple.com/en-us/HT213488 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213489 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213490 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213491 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213492 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213494 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:25

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/170011/XNU-vm_object-Use-After-Free.html - Third Party Advisory, VDB Entry
References () https://support.apple.com/en-us/HT213488 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213488 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213489 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213489 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213490 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213490 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213491 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213491 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213492 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213492 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213494 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213494 - Release Notes, Vendor Advisory

Information

Published : 2022-11-01 20:15

Updated : 2024-11-21 07:25


NVD link : CVE-2022-42801

Mitre link : CVE-2022-42801

CVE.ORG link : CVE-2022-42801


JSON object : View

Products Affected

apple

  • iphone_os
  • ipados
  • macos
  • tvos
  • watchos