![]() Impact: An application may be able to delete files for which it does not have permissionĭescription: A race condition was addressed with additional validation.ĬVE-2022-21658: Florian Weimer added May 25, 2022 These issues were addressed with improved input validation. Impact: An attacker in a privileged position may be able to perform a denial of service attackĭescription: A null pointer dereference was addressed with improved validation.ĬVE-2022-22638: derrek for: macOS Montereyĭescription: Multiple memory corruption issues existed in libarchive. Impact: A malicious application may be able to elevate privileges Impact: Processing a maliciously crafted image may lead to heap corruptionĭescription: A memory consumption issue was addressed with improved memory handling.ĭescription: A type confusion issue was addressed with improved state handling.ĬVE-2022-22661: an anonymous researcher, Pan ZhenPeng of Alibaba Security Pandora LabĬVE-2022-22641: Mohamed Ghannam for: macOS MontereyĬVE-2022-22613: Alex, an anonymous researcher Impact: Processing a maliciously crafted image may lead to arbitrary code execution Impact: A malicious application may be able to execute arbitrary code with kernel privilegesĭescription: A buffer overflow was addressed with improved bounds checking.ĬVE-2021-30977: Jack Dates of RET2 Systems, Inc. Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code executionĭescription: A memory initialization issue was addressed with improved memory handling.ĬVE-2022-22657: Brandon Perry of Atredis PartnersĬVE-2022-22664: Brandon Perry of Atredis Partners Impact: A user may send audio and video in a FaceTime call without knowing that they have done soĬVE-2022-22643: Sonali Luthar of the University of Virginia, Michael Liao of the University of Illinois at Urbana-Champaign, Rohan Pahwa of Rutgers University, and Bao Nguyen of the University of Florida ![]() Impact: A malicious application may bypass Gatekeeper checksĭescription: This issue was addressed with improved checks to prevent unauthorized actions.ĬVE-2022-22663: Arsenii Kostromin (0x3c3e)ĭescription: A logic issue was addressed with improved state management.ĭescription: Multiple issues were addressed by updating to curl version 7.79.1. Impact: A maliciously crafted ZIP archive may bypass Gatekeeper checksĬVE-2022-22616: Ferdous Saljooki and Jaron Bradley of Jamf Software, Mickey Jin for: macOS Monterey Impact: Processing a maliciously crafted file may lead to arbitrary code executionĭescription: A memory corruption issue was addressed with improved validation.ĬVE-2022-22597: Qi Sun and Robert Ai of Trend Micro Impact: An application may be able to read restricted memoryĭescription: This issue was addressed with improved checks.ĬVE-2022-22648: Mickey Jin of Trend Microĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2022-22626: Mickey Jin of Trend MicroĬVE-2022-22627: Qi Sun and Robert Ai of Trend Micro Impact: Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memoryĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2022-22625: Mickey Jin of Trend Micro Impact: An application may be able to gain elevated privilegesĭescription: An out-of-bounds write issue was addressed with improved bounds checking. Impact: A malicious application may be able to gain root privilegesĭescription: A logic issue was addressed with improved validation. Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A use after free issue was addressed with improved memory management. Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code executionĭescription: A memory corruption issue was addressed with improved state management.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |