From dbf6dc569368dfac3170fe2672510c0fb18f5889 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 23 Sep 2022 19:00:47 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/32xxx/CVE-2022-32797.json | 83 ++++++++++++++++++++- 2022/32xxx/CVE-2022-32799.json | 67 ++++++++++++++++- 2022/32xxx/CVE-2022-32800.json | 83 ++++++++++++++++++++- 2022/32xxx/CVE-2022-32801.json | 51 ++++++++++++- 2022/32xxx/CVE-2022-32805.json | 83 ++++++++++++++++++++- 2022/32xxx/CVE-2022-32807.json | 83 ++++++++++++++++++++- 2022/32xxx/CVE-2022-32815.json | 131 ++++++++++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32816.json | 99 ++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32817.json | 99 ++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32818.json | 51 ++++++++++++- 2022/32xxx/CVE-2022-32819.json | 131 ++++++++++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32820.json | 131 ++++++++++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32821.json | 99 ++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32823.json | 131 ++++++++++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32825.json | 115 ++++++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32826.json | 131 ++++++++++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32828.json | 83 ++++++++++++++++++++- 2022/32xxx/CVE-2022-32829.json | 67 ++++++++++++++++- 2022/32xxx/CVE-2022-32831.json | 83 ++++++++++++++++++++- 2022/32xxx/CVE-2022-32832.json | 131 ++++++++++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32841.json | 99 ++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32842.json | 67 ++++++++++++++++- 2022/32xxx/CVE-2022-32843.json | 83 ++++++++++++++++++++- 2022/32xxx/CVE-2022-32845.json | 83 ++++++++++++++++++++- 2022/32xxx/CVE-2022-32847.json | 131 ++++++++++++++++++++++++++++++++- 2022/32xxx/CVE-2022-32848.json | 67 ++++++++++++++++- 2022/32xxx/CVE-2022-32851.json | 83 ++++++++++++++++++++- 2022/32xxx/CVE-2022-32853.json | 83 ++++++++++++++++++++- 28 files changed, 2544 insertions(+), 84 deletions(-) diff --git a/2022/32xxx/CVE-2022-32797.json b/2022/32xxx/CVE-2022-32797.json index f56df9a6e2c..1365e52012f 100644 --- a/2022/32xxx/CVE-2022-32797.json +++ b/2022/32xxx/CVE-2022-32797.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32797", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed with improved checks. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory." } ] } diff --git a/2022/32xxx/CVE-2022-32799.json b/2022/32xxx/CVE-2022-32799.json index 04cee747407..3cc8f80aaf8 100644 --- a/2022/32xxx/CVE-2022-32799.json +++ b/2022/32xxx/CVE-2022-32799.json @@ -4,14 +4,75 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32799", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A user in a privileged network position may be able to leak sensitive information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds read issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Monterey 12.5. A user in a privileged network position may be able to leak sensitive information." } ] } diff --git a/2022/32xxx/CVE-2022-32800.json b/2022/32xxx/CVE-2022-32800.json index c3ef722f342..4964d933dc5 100644 --- a/2022/32xxx/CVE-2022-32800.json +++ b/2022/32xxx/CVE-2022-32800.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32800", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to modify protected parts of the file system" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed with improved checks. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to modify protected parts of the file system." } ] } diff --git a/2022/32xxx/CVE-2022-32801.json b/2022/32xxx/CVE-2022-32801.json index e5b8a84a4d2..5f1473cd461 100644 --- a/2022/32xxx/CVE-2022-32801.json +++ b/2022/32xxx/CVE-2022-32801.json @@ -4,14 +4,59 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32801", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to gain root privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.5. An app may be able to gain root privileges." } ] } diff --git a/2022/32xxx/CVE-2022-32805.json b/2022/32xxx/CVE-2022-32805.json index 60fb92e3de4..ca57eab9d52 100644 --- a/2022/32xxx/CVE-2022-32805.json +++ b/2022/32xxx/CVE-2022-32805.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32805", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to access sensitive user information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved handling of caches. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to access sensitive user information." } ] } diff --git a/2022/32xxx/CVE-2022-32807.json b/2022/32xxx/CVE-2022-32807.json index 4bf4d70d934..2b169945b02 100644 --- a/2022/32xxx/CVE-2022-32807.json +++ b/2022/32xxx/CVE-2022-32807.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32807", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to overwrite arbitrary files" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed with improved file handling. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to overwrite arbitrary files." } ] } diff --git a/2022/32xxx/CVE-2022-32815.json b/2022/32xxx/CVE-2022-32815.json index 9c1092a9a9e..29d60254364 100644 --- a/2022/32xxx/CVE-2022-32815.json +++ b/2022/32xxx/CVE-2022-32815.json @@ -4,14 +4,139 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32815", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app with root privileges may be able to execute arbitrary code with kernel privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app with root privileges may be able to execute arbitrary code with kernel privileges." } ] } diff --git a/2022/32xxx/CVE-2022-32816.json b/2022/32xxx/CVE-2022-32816.json index ed2d0c4554c..966b67a1fba 100644 --- a/2022/32xxx/CVE-2022-32816.json +++ b/2022/32xxx/CVE-2022-32816.json @@ -4,14 +4,107 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32816", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Visiting a website that frames malicious content may lead to UI spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved UI handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. Visiting a website that frames malicious content may lead to UI spoofing." } ] } diff --git a/2022/32xxx/CVE-2022-32817.json b/2022/32xxx/CVE-2022-32817.json index 1dfc4e71d02..001fc48cfc6 100644 --- a/2022/32xxx/CVE-2022-32817.json +++ b/2022/32xxx/CVE-2022-32817.json @@ -4,14 +4,107 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32817", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to disclose kernel memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds read issue was addressed with improved bounds checking. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory." } ] } diff --git a/2022/32xxx/CVE-2022-32818.json b/2022/32xxx/CVE-2022-32818.json index 100978f04a8..edb75d4dd12 100644 --- a/2022/32xxx/CVE-2022-32818.json +++ b/2022/32xxx/CVE-2022-32818.json @@ -4,14 +4,59 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32818", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to leak sensitive kernel state" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.5. An app may be able to leak sensitive kernel state." } ] } diff --git a/2022/32xxx/CVE-2022-32819.json b/2022/32xxx/CVE-2022-32819.json index 796fd6df622..0752e58b2d9 100644 --- a/2022/32xxx/CVE-2022-32819.json +++ b/2022/32xxx/CVE-2022-32819.json @@ -4,14 +4,139 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32819", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to gain root privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A logic issue was addressed with improved state management. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to gain root privileges." } ] } diff --git a/2022/32xxx/CVE-2022-32820.json b/2022/32xxx/CVE-2022-32820.json index e7d06833c3d..e4cd76fef7e 100644 --- a/2022/32xxx/CVE-2022-32820.json +++ b/2022/32xxx/CVE-2022-32820.json @@ -4,14 +4,139 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32820", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to execute arbitrary code with kernel privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to execute arbitrary code with kernel privileges." } ] } diff --git a/2022/32xxx/CVE-2022-32821.json b/2022/32xxx/CVE-2022-32821.json index 7dd652be834..2f363b6bdc2 100644 --- a/2022/32xxx/CVE-2022-32821.json +++ b/2022/32xxx/CVE-2022-32821.json @@ -4,14 +4,107 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32821", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to execute arbitrary code with kernel privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory corruption issue was addressed with improved validation. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges." } ] } diff --git a/2022/32xxx/CVE-2022-32823.json b/2022/32xxx/CVE-2022-32823.json index 51bb30cf7b8..facdc85a4fd 100644 --- a/2022/32xxx/CVE-2022-32823.json +++ b/2022/32xxx/CVE-2022-32823.json @@ -4,14 +4,139 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32823", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to leak sensitive user information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to leak sensitive user information." } ] } diff --git a/2022/32xxx/CVE-2022-32825.json b/2022/32xxx/CVE-2022-32825.json index c00ed23b8ec..37d55985a7c 100644 --- a/2022/32xxx/CVE-2022-32825.json +++ b/2022/32xxx/CVE-2022-32825.json @@ -4,14 +4,123 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32825", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to disclose kernel memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory." } ] } diff --git a/2022/32xxx/CVE-2022-32826.json b/2022/32xxx/CVE-2022-32826.json index 3c51f4e3c83..1ec9939e7c1 100644 --- a/2022/32xxx/CVE-2022-32826.json +++ b/2022/32xxx/CVE-2022-32826.json @@ -4,14 +4,139 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32826", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to gain root privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to gain root privileges." } ] } diff --git a/2022/32xxx/CVE-2022-32828.json b/2022/32xxx/CVE-2022-32828.json index c235f98867c..a761b557a0d 100644 --- a/2022/32xxx/CVE-2022-32828.json +++ b/2022/32xxx/CVE-2022-32828.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32828", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to disclose kernel memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, tvOS 15.6, macOS Monterey 12.5. An app may be able to disclose kernel memory." } ] } diff --git a/2022/32xxx/CVE-2022-32829.json b/2022/32xxx/CVE-2022-32829.json index 04a78d02ccd..76595fbfa2b 100644 --- a/2022/32xxx/CVE-2022-32829.json +++ b/2022/32xxx/CVE-2022-32829.json @@ -4,14 +4,75 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32829", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to execute arbitrary code with kernel privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed with improved checks. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges." } ] } diff --git a/2022/32xxx/CVE-2022-32831.json b/2022/32xxx/CVE-2022-32831.json index 6a60fdc3bcb..04ed27d6f59 100644 --- a/2022/32xxx/CVE-2022-32831.json +++ b/2022/32xxx/CVE-2022-32831.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32831", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory." } ] } diff --git a/2022/32xxx/CVE-2022-32832.json b/2022/32xxx/CVE-2022-32832.json index b5b74a7f202..323a5a75ee9 100644 --- a/2022/32xxx/CVE-2022-32832.json +++ b/2022/32xxx/CVE-2022-32832.json @@ -4,14 +4,139 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32832", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app with root privileges may be able to execute arbitrary code with kernel privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved memory handling. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app with root privileges may be able to execute arbitrary code with kernel privileges." } ] } diff --git a/2022/32xxx/CVE-2022-32841.json b/2022/32xxx/CVE-2022-32841.json index e921f9e0417..42a78c4d2be 100644 --- a/2022/32xxx/CVE-2022-32841.json +++ b/2022/32xxx/CVE-2022-32841.json @@ -4,14 +4,107 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32841", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted image may result in disclosure of process memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. Processing a maliciously crafted image may result in disclosure of process memory." } ] } diff --git a/2022/32xxx/CVE-2022-32842.json b/2022/32xxx/CVE-2022-32842.json index 971d326bc90..5b055ec87b9 100644 --- a/2022/32xxx/CVE-2022-32842.json +++ b/2022/32xxx/CVE-2022-32842.json @@ -4,14 +4,75 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32842", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to gain elevated privileges" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Monterey 12.5. An app may be able to gain elevated privileges." } ] } diff --git a/2022/32xxx/CVE-2022-32843.json b/2022/32xxx/CVE-2022-32843.json index ab4bf36ef24..7831507ad51 100644 --- a/2022/32xxx/CVE-2022-32843.json +++ b/2022/32xxx/CVE-2022-32843.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32843", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted Postscript file may result in unexpected app termination or disclosure of process memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted Postscript file may result in unexpected app termination or disclosure of process memory." } ] } diff --git a/2022/32xxx/CVE-2022-32845.json b/2022/32xxx/CVE-2022-32845.json index 7cad17669aa..247fdc30c4d 100644 --- a/2022/32xxx/CVE-2022-32845.json +++ b/2022/32xxx/CVE-2022-32845.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32845", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to break out of its sandbox" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed with improved checks. This issue is fixed in watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to break out of its sandbox." } ] } diff --git a/2022/32xxx/CVE-2022-32847.json b/2022/32xxx/CVE-2022-32847.json index 7ec5796b762..1ded5c509c1 100644 --- a/2022/32xxx/CVE-2022-32847.json +++ b/2022/32xxx/CVE-2022-32847.json @@ -4,14 +4,139 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32847", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + }, + { + "product_name": "tvOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "8.7" + } + ] + } + }, + { + "product_name": "watchOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "15.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "A remote user may be able to cause unexpected system termination or corrupt kernel memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213340", + "name": "https://support.apple.com/en-us/HT213340" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213342", + "name": "https://support.apple.com/en-us/HT213342" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213346", + "name": "https://support.apple.com/en-us/HT213346" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This issue was addressed with improved checks. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. A remote user may be able to cause unexpected system termination or corrupt kernel memory." } ] } diff --git a/2022/32xxx/CVE-2022-32848.json b/2022/32xxx/CVE-2022-32848.json index 544a9f31f62..957b36e421e 100644 --- a/2022/32xxx/CVE-2022-32848.json +++ b/2022/32xxx/CVE-2022-32848.json @@ -4,14 +4,75 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32848", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "An app may be able to capture a user\u2019s screen" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.8, macOS Monterey 12.5. An app may be able to capture a user\u2019s screen." } ] } diff --git a/2022/32xxx/CVE-2022-32851.json b/2022/32xxx/CVE-2022-32851.json index 2535bca605a..4208c07c4c5 100644 --- a/2022/32xxx/CVE-2022-32851.json +++ b/2022/32xxx/CVE-2022-32851.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32851", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory." } ] } diff --git a/2022/32xxx/CVE-2022-32853.json b/2022/32xxx/CVE-2022-32853.json index ad97bb25b1d..93164c17f6d 100644 --- a/2022/32xxx/CVE-2022-32853.json +++ b/2022/32xxx/CVE-2022-32853.json @@ -4,14 +4,91 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-32853", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "product-security@apple.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Apple", + "product": { + "product_data": [ + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "12.5" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "11.6" + } + ] + } + }, + { + "product_name": "macOS", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "2022" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213345", + "name": "https://support.apple.com/en-us/HT213345" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213344", + "name": "https://support.apple.com/en-us/HT213344" + }, + { + "refsource": "MISC", + "url": "https://support.apple.com/en-us/HT213343", + "name": "https://support.apple.com/en-us/HT213343" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory." } ] }