CVE-2022-42867

A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution.
References
Link Resource
http://seclists.org/fulldisclosure/2022/Dec/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/23 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/26 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/27 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/28 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/12/26/1 Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202305-32
https://support.apple.com/en-us/HT213530 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213532 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213535 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213536 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213537 Release Notes Vendor Advisory
http://seclists.org/fulldisclosure/2022/Dec/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/23 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/26 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/27 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2022/Dec/28 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/12/26/1 Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202305-32
https://support.apple.com/en-us/HT213530 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213532 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213535 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213536 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT213537 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:25

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2022/Dec/20 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/20 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Dec/23 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/23 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Dec/26 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/26 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Dec/27 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/27 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2022/Dec/28 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2022/Dec/28 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2022/12/26/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/12/26/1 - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202305-32 - () https://security.gentoo.org/glsa/202305-32 -
References () https://support.apple.com/en-us/HT213530 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213530 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213532 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213532 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213535 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213535 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213536 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213536 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT213537 - Release Notes, Vendor Advisory () https://support.apple.com/en-us/HT213537 - Release Notes, Vendor Advisory
Summary
  • (es) Se solucionó un problema de use after free con una gestión de memoria mejorada. Este problema se solucionó en Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 y iPadOS 16.2, watchOS 9.2. El procesamiento de contenido web creado con fines malintencionados puede provocar la ejecución de código arbitrario.

Information

Published : 2022-12-15 19:15

Updated : 2025-04-21 15:15


NVD link : CVE-2022-42867

Mitre link : CVE-2022-42867

CVE.ORG link : CVE-2022-42867


JSON object : View

Products Affected

apple

  • ipados
  • tvos
  • macos
  • safari
  • iphone_os
  • watchos
CWE
CWE-416

Use After Free