CVE-2022-42864

A race condition was addressed with improved state handling. This issue is fixed in tvOS 16.2, macOS Monterey 12.6.2, macOS Ventura 13.1, macOS Big Sur 11.7.2, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges.
References
Link Resource
http://seclists.org/fulldisclosure/2022/Dec/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/21 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/23 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/24 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/25 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/26 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/27 Mailing List Third Party Advisory
https://support.apple.com/en-us/HT213530 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213531 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213532 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213533 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213534 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213535 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213536 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

09 Jan 2023, 16:46

Type Values Removed Values Added
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/23 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/23 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/27 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/27 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/24 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/24 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/20 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/20 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/25 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/25 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/26 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/26 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/21 - (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/21 - Mailing List, Third Party Advisory

21 Dec 2022, 06:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/23 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/27 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/21 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/20 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/25 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/26 -
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/Dec/24 -

20 Dec 2022, 15:13

Type Values Removed Values Added
References (MISC) https://support.apple.com/en-us/HT213534 - (MISC) https://support.apple.com/en-us/HT213534 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213536 - (MISC) https://support.apple.com/en-us/HT213536 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213530 - (MISC) https://support.apple.com/en-us/HT213530 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213531 - (MISC) https://support.apple.com/en-us/HT213531 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213532 - (MISC) https://support.apple.com/en-us/HT213532 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213533 - (MISC) https://support.apple.com/en-us/HT213533 - Release Notes, Vendor Advisory
References (MISC) https://support.apple.com/en-us/HT213535 - (MISC) https://support.apple.com/en-us/HT213535 - Release Notes, Vendor Advisory
CWE CWE-362
CPE cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
First Time Apple watchos
Apple ipados
Apple iphone Os
Apple macos
Apple tvos
Apple

15 Dec 2022, 19:56

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-15 19:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-42864

Mitre link : CVE-2022-42864

CVE.ORG link : CVE-2022-42864


JSON object : View

Products Affected

apple

  • macos
  • tvos
  • watchos
  • iphone_os
  • ipados
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')