First published: Mon May 16 2022(Updated: )
A race condition was addressed with improved state handling. This issue is fixed in watchOS 8.6, tvOS 15.5, macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
Credit: Linus Henze Pinauten GmbHLinus Henze Pinauten GmbHLinus Henze Pinauten GmbHLinus Henze Pinauten GmbH product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <8.6 | 8.6 |
Apple tvOS | <15.5 | 15.5 |
<12.4 | 12.4 | |
Apple iOS | <15.5 | 15.5 |
Apple iPadOS | <15.5 | 15.5 |
Apple iPadOS | <15.5 | |
Apple iPhone OS | <15.5 | |
Apple macOS | >=12.0<12.4 | |
Apple tvOS | <15.5 | |
Apple watchOS | <8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2022-26765.
The title of this vulnerability is Kernel. A race condition was addressed with improved state handling.
The affected software includes Apple watchOS 8.6, Apple tvOS 15.5, macOS Monterey 12.4, Apple iOS 15.5, and Apple iPadOS 15.5.
The severity of this vulnerability is not specified.
You can fix this vulnerability by updating your software to the specified remedy versions provided by Apple.