Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: An out-of-bounds write issue was addressed with improved input validation.ĬVE-2022-26756: Jack Dates of RET2 Systems, IncĬVE-2022-26769: Antonio Zekic Graphics Driver Impact: A malicious application may be able to execute arbitrary code with kernel privilegesĬVE-2022-26720: Liu Long of Ant Security Light-Year LabĬVE-2022-26770: Liu Long of Ant Security Light-Year Lab This was addressed with improved input validation. Impact: A local user may be able to read kernel memoryĭescription: An out-of-bounds read issue existed that led to the disclosure of kernel memory. Impact: A malicious application may be able to execute arbitrary code with system privilegesĭescription: An out-of-bounds access issue was addressed with improved bounds checking.ĬVE-2022-26763: Linus Henze of Pinauten GmbH () Impact: A malicious application may bypass Gatekeeper checksĭescription: This issue was addressed with improved checks to prevent unauthorized actions.ĬVE-2022-22663: Arsenii Kostromin (0x3c3e)ĭescription: A memory initialization issue was addressed. Impact: Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memoryĭescription: An out-of-bounds read issue was addressed with improved bounds checking.ĬVE-2022-26698: Qi Sun of Trend Micro, Ye Zhang of Baidu Securityĭescription: An out-of-bounds read issue was addressed with improved input validation.ĬVE-2022-26697: Qi Sun and Robert Ai of Trend Micro Impact: Processing a maliciously crafted image may lead to arbitrary code executionĭescription: A memory corruption issue was addressed with improved input validation.ĬVE-2022-26751: Michael DePlante of Trend Micro Zero Day Initiative Impact: A remote attacker may be able to cause an unexpected app termination or arbitrary code executionĭescription: A use after free issue was addressed with improved memory management.ĬVE-2022-22630: Jeremy Brown working with Trend Micro Zero Day Initiative Apple is aware of a report that this issue may have been actively exploited.ĭescription: An out-of-bounds write issue was addressed with improved bounds checking. Impact: An application may be able to execute arbitrary code with kernel privileges. Impact: A malicious application may be able to gain root privilegesĭescription: A logic issue was addressed with improved validation. Description: Multiple issues were addressed by updating apache to version 2.4.53.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |