An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Monterey 12.3.1, Security Update 2022-004 Catalina, macOS Big Sur 11.6.6. A local user may be able to read kernel memory.
References
Link | Resource |
---|---|
https://support.apple.com/en-us/HT213220 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213255 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213256 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213220 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213255 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213256 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.apple.com/en-us/HT213220 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213255 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213256 - Release Notes, Vendor Advisory |
08 Jun 2022, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://support.apple.com/en-us/HT213256 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213255 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213220 - Release Notes, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.9
v3 : 5.5 |
CWE | CWE-125 | |
CPE | cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:* |
26 May 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-26 18:15
Updated : 2025-02-28 14:53
NVD link : CVE-2022-22674
Mitre link : CVE-2022-22674
CVE.ORG link : CVE-2022-22674
JSON object : View
Products Affected
apple
- macos
- mac_os_x
CWE
CWE-125
Out-of-bounds Read