![]() ![]() Impact: An app may be able to access sensitive user informationĭescription: The issue was addressed with improved handling of caches.ĬVE-2022-32805: Csaba Fitzl of Offensive Security Impact: An app may be able to execute arbitrary code with kernel privilegesĭescription: An out-of-bounds write issue was addressed with improved input validation. Impact: An app may be able to disclose kernel memoryĬVE-2022-32825: John Aakerblom for: macOS Big Sur Impact: An archive may be able to bypass Gatekeeperĭescription: A logic issue was addressed with improved checks.ĬVE-2022-32910: Ferdous Saljooki of Jamf Software ![]() Impact: Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memoryĭescription: This issue was addressed with improved checks.ĬVE-2022-32797: Mickey Jin Ye Zhang of Baidu Security, Mickey Jin of Trend Microĭescription: An out-of-bounds read issue was addressed with improved input validation.ĬVE-2022-32853: Ye Zhang of Baidu SecurityĬVE-2022-32851: Ye Zhang of Baidu Securityĭescription: An out-of-bounds read issue was addressed with improved bounds checking.ĬVE-2022-32831: Ye Zhang of Baidu Security Impact: An app may be able to gain root privilegesĭescription: An authorization issue was addressed with improved state management.ĬVE-2022-32826: Mickey Jin of Trend Micro Impact: An app with root privileges may be able to execute arbitrary code with kernel privilegesĭescription: The issue was addressed with improved memory handling.ĬVE-2022-32832: Tommy Muir for: macOS Big Sur ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |