CVE-2022-42801
Summary
| CVE | CVE-2022-42801 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-11-01 20:15:00 UTC |
| Updated | 2022-12-02 22:45:00 UTC |
| Description | A logic issue was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, iOS 16.1 and iPadOS 16, macOS Monterey 12.6.1. An app may be able to execute arbitrary code with kernel privileges. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| About the security content of watchOS 9.1 - Apple Support | MISC | support.apple.com | |
| About the security content of iOS 15.7.1 and iPadOS 15.7.1 - Apple Support | MISC | support.apple.com | |
| About the security content of tvOS 16.1 - Apple Support | MISC | support.apple.com | |
| About the security content of macOS Monterey 12.6.1 - Apple Support | MISC | support.apple.com | |
| About the security content of macOS Ventura 13 - Apple Support | MISC | support.apple.com | |
| XNU vm_object Use-After-Free ≈ Packet Storm | MISC | packetstormsecurity.com | |
| About the security content of iOS 16.1 and iPadOS 16 - Apple Support | MISC | support.apple.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.