First published: Wed Jul 20 2022(Updated: )
A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6. An app with arbitrary kernel read and write capability may be able to bypass Pointer Authentication.
Credit: Sreejith Krishnan R @skr0x1c0 Sreejith Krishnan R @skr0x1c0 Sreejith Krishnan R @skr0x1c0 product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <15.6 | |
Apple iPhone OS | <15.6 | |
Apple tvOS | <15.6 | |
Apple watchOS | <8.7 | |
Apple watchOS | <8.7 | 8.7 |
Apple iOS | <15.6 | 15.6 |
Apple iPadOS | <15.6 | 15.6 |
Apple tvOS | <15.6 | 15.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2022-32844 is not mentioned in the provided information.
CVE-2022-32844 affects Apple iOS versions up to but not including 15.6.
CVE-2022-32844 affects Apple iPadOS versions up to but not including 15.6.
CVE-2022-32844 affects Apple watchOS versions up to but not including 8.7.
CVE-2022-32844 affects Apple tvOS versions up to but not including 15.6.
To fix CVE-2022-32844, update to the latest version of the affected software. Refer to the provided Apple support links for more information.