First published: Mon Oct 24 2022(Updated: )
A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13. An app with root privileges may be able to execute arbitrary code with kernel privileges.
Credit: an anonymous researcher an anonymous researcher an anonymous researcher an anonymous researcher product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
<13 | 13 | |
Apple iOS | <16.1 | 16.1 |
Apple iPadOS | <16 | 16 |
Apple iPadOS | <16.0 | |
Apple iPhone OS | <16.1 | |
Apple macOS | <13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this race condition in ppp is CVE-2022-42831.
The affected software for this vulnerability includes Apple macOS Ventura up to version 13, Apple iOS up to version 16.1, and Apple iPadOS up to version 16.
The severity of CVE-2022-42831 is not provided in the available information.
To fix the race condition vulnerability in ppp, it is recommended to apply the latest security updates provided by Apple for the affected software versions.
More information about CVE-2022-42831 can be found in the references provided: [reference1](https://support.apple.com/en-us/HT213489) and [reference2](https://support.apple.com/en-us/HT213488).